Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
87
views
0
references
Top references
cited by
103
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
708
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Peer-to-Peer Systems
The Sybil Attack
other
Author(s):
John R. Douceur
Publication date
(Online):
October 10 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
October 10 2002
Pages
: 251-260
DOI:
10.1007/3-540-45748-8_24
SO-VID:
3bc3df7c-2cdb-47bf-bca1-4ebace42c6bc
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 45
Routing Algorithms for DHTs: Some Open Questions
pp. 53
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
pp. 85
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
pp. 94
Can Heterogeneity Make Gnutella Scalable?
pp. 121
Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
pp. 130
Mnemosyne: Peer-to-Peer Steganographic Storage
pp. 155
Serving DNS Using a Peer-to-Peer Lookup Service
pp. 203
Peer-to-Peer Caching Schemes to Address Flash Crowds
pp. 242
Complex Queries in DHT-based Peer-to-Peer Networks
pp. 251
The Sybil Attack
pp. 261
Security Considerations for Peer-to-Peer Distributed Hash Tables
pp. 270
Dynamically Fault-Tolerant Content Addressable Networks
pp. 306
Dynamic Replica Placement for Scalable Content Delivery
pp. 328
Erasure Coding Vs. Replication: A Quantitative Comparison
Similar content
708
Two: Bards and Sybils: Landscape, Gender, and the Culture of Dispute in the Poems of H. L. V. Derozio and Emma Roberts
Authors:
Multi-channel based Sybil Attack Detection in Vehicular Ad Hoc Networks using RSSI
Authors:
Yuan Yao
,
Bin Xiao
,
Gaofei Wu
…
Self-certified Sybil-free pseudonyms
Authors:
Leonardo A. Martucci
,
Markulf Kohlweiss
,
Christer Andersson
…
See all similar
Cited by
285
Blockchains and Smart Contracts for the Internet of Things
Authors:
Konstantinos Christidis
,
Michael Devetsikiotis
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
Authors:
Florian Tschorsch
,
Bjorn Scheuermann
Security of the Internet of Things: perspectives and challenges
Authors:
Dechao Qiu
,
Qi Jing
,
Athanasios V Vasilakos
…
See all cited by