ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
60
views
0
references
Top references
cited by
95
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
593
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Peer-to-Peer Systems
The Sybil Attack
other
Author(s):
John R. Douceur
Publication date
(Online):
October 10 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
October 10 2002
Pages
: 251-260
DOI:
10.1007/3-540-45748-8_24
SO-VID:
3bc3df7c-2cdb-47bf-bca1-4ebace42c6bc
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 45
Routing Algorithms for DHTs: Some Open Questions
pp. 53
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
pp. 85
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
pp. 94
Can Heterogeneity Make Gnutella Scalable?
pp. 121
Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
pp. 130
Mnemosyne: Peer-to-Peer Steganographic Storage
pp. 155
Serving DNS Using a Peer-to-Peer Lookup Service
pp. 203
Peer-to-Peer Caching Schemes to Address Flash Crowds
pp. 242
Complex Queries in DHT-based Peer-to-Peer Networks
pp. 251
The Sybil Attack
pp. 261
Security Considerations for Peer-to-Peer Distributed Hash Tables
pp. 270
Dynamically Fault-Tolerant Content Addressable Networks
pp. 306
Dynamic Replica Placement for Scalable Content Delivery
pp. 328
Erasure Coding Vs. Replication: A Quantitative Comparison
Similar content
593
Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges
Authors:
Jianqiang Li
,
Qingxiang Gong
,
Qiao Yan
…
Adaptive Resilient Control for Variable-Speed Wind Turbines Against False Data Injection Attacks
Authors:
Shiyi Zhao
,
Qinmin Yang
,
Peng Cheng
…
False Data Injection Attacks and the Distributed Countermeasure in DC Microgrids
Authors:
Mengxiang Liu
,
Chengcheng Zhao
,
Ruilong Deng
…
See all similar
Cited by
277
Blockchains and Smart Contracts for the Internet of Things
Authors:
Konstantinos Christidis
,
Michael Devetsikiotis
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
Authors:
Florian Tschorsch
,
Bjorn Scheuermann
Security of the Internet of Things: perspectives and challenges
Authors:
Dechao Qiu
,
Qi Jing
,
Athanasios V Vasilakos
…
See all cited by