Sybil attack
Top View
- Who Watches the Watchmen? a Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols
- Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers
- Redemocratizing Permissionless Cryptocurrencies
- Verity Ledger: a Protocol for Improving Data Quality and Ensuring Data Authenticity in Publicly-Built Open Datasets by Israel R
- Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks
- Blockchain Attacks, Analysis and a Model to Solve Double Spending Attack
- Blockchain-Based Sybil Attack Mitigation: a Case Study of the I2P
- Redemocratizing Permissionless Cryptocurrencies
- Proof-Of-CAPTCHA: a True ASIC-Resistant Consensus
- Zero-Knowledge Proof-Of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies