DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Sybil attack
Sybil attack
Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood
Senate
Sybil Attacks on Identity-Augmented Proof-Of-Stake
A Truth-Inducing Sybil Resistant Decentralized Blockchain Oracle
Practical Attacks Against the I2P Network
Security Aspects of Distributed LeDger Technologies
Strongly Private Communications in a Homogeneous Network
Practical Attacks Against the I2P Network Christoph Egger
Identifying and Characterizing Sybils in the Tor Network
Detecting Sybil Attacks Using Proofs of Work and Location in Vanets
On the Danger of Private Blockchains
Torcoin the Power of Distributed Consensus on the Blockchain Leveraged for Tor
Omniledger: a Secure, Scale-Out, Decentralized Ledger Via Sharding
Anonymity & Monitoring
Decentralized Proof-Of-Unique-Human
Sybil-Resistant Pseudonymization and Pseudonym Change Without Trusted Third Parties
Permissioned Vs. Permissionless Blockchain: How and Why There Is Only One Right Choice
Consensus Algorithm for Preserving Energy Consumption
Top View
Who Watches the Watchmen? a Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols
Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers
Redemocratizing Permissionless Cryptocurrencies
Verity Ledger: a Protocol for Improving Data Quality and Ensuring Data Authenticity in Publicly-Built Open Datasets by Israel R
Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks
Blockchain Attacks, Analysis and a Model to Solve Double Spending Attack
Blockchain-Based Sybil Attack Mitigation: a Case Study of the I2P
Redemocratizing Permissionless Cryptocurrencies
Proof-Of-CAPTCHA: a True ASIC-Resistant Consensus
Zero-Knowledge Proof-Of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies