DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Sybil attack

Sybil attack

  • Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood

    Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood

  • Senate

    Senate

  • Sybil Attacks on Identity-Augmented Proof-Of-Stake

    Sybil Attacks on Identity-Augmented Proof-Of-Stake

  • A Truth-Inducing Sybil Resistant Decentralized Blockchain Oracle

    A Truth-Inducing Sybil Resistant Decentralized Blockchain Oracle

  • Practical Attacks Against the I2P Network

    Practical Attacks Against the I2P Network

  • Security Aspects of Distributed Le​​​Dger Technologies

    Security Aspects of Distributed Le​​​Dger Technologies

  • Strongly Private Communications in a Homogeneous Network

    Strongly Private Communications in a Homogeneous Network

  • Practical Attacks Against the I2P Network Christoph Egger

    Practical Attacks Against the I2P Network Christoph Egger

  • Identifying and Characterizing Sybils in the Tor Network

    Identifying and Characterizing Sybils in the Tor Network

  • Detecting Sybil Attacks Using Proofs of Work and Location in Vanets

    Detecting Sybil Attacks Using Proofs of Work and Location in Vanets

  • On the Danger of Private Blockchains

    On the Danger of Private Blockchains

  • Torcoin the Power of Distributed Consensus on the Blockchain Leveraged for Tor

    Torcoin the Power of Distributed Consensus on the Blockchain Leveraged for Tor

  • Omniledger: a Secure, Scale-Out, Decentralized Ledger Via Sharding

    Omniledger: a Secure, Scale-Out, Decentralized Ledger Via Sharding

  • Anonymity & Monitoring

    Anonymity & Monitoring

  • Decentralized Proof-Of-Unique-Human

    Decentralized Proof-Of-Unique-Human

  • Sybil-Resistant Pseudonymization and Pseudonym Change Without Trusted Third Parties

    Sybil-Resistant Pseudonymization and Pseudonym Change Without Trusted Third Parties

  • Permissioned Vs. Permissionless Blockchain: How and Why There Is Only One Right Choice

    Permissioned Vs. Permissionless Blockchain: How and Why There Is Only One Right Choice

  • Consensus Algorithm for Preserving Energy Consumption

    Consensus Algorithm for Preserving Energy Consumption

Top View
  • Who Watches the Watchmen? a Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols
  • Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers
  • Redemocratizing Permissionless Cryptocurrencies
  • Verity Ledger: a Protocol for Improving Data Quality and Ensuring Data Authenticity in Publicly-Built Open Datasets by Israel R
  • Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks
  • Blockchain Attacks, Analysis and a Model to Solve Double Spending Attack
  • Blockchain-Based Sybil Attack Mitigation: a Case Study of the I2P
  • Redemocratizing Permissionless Cryptocurrencies
  • Proof-Of-CAPTCHA: a True ASIC-Resistant Consensus
  • Zero-Knowledge Proof-Of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies


© 2024 Docslib.org    Feedback