专题首页
中图分类法(2)
社会科学总论(2)
在“
自然资源管理
”中,
命中:
2
条,耗时:小于0.01 秒
1.
Stalk and lie—The cost of
Sybil
attack
s in opportunistic networks
作者:
Sacha Trifunovic
;
a
;
sascha.trifunovic@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
trifunovic@tik.ee.ethz.ch" class="auth_mail" title="E-mail the corresponding author
;
Andreea Hossmann-Picub
关键词:
Sybil
attack
;
Opportunistic networking
;
Trust
;
Community structure
;
Social network
刊名:Computer Communications
年:2016
2.
Making puzzles green and useful for adaptive identity management in large-scale distributed systems
作者:
Weverton Luis da Costa Cordeiro
;
a
;
weverton.cordeiro@inf.ufrgs.br" class="auth_mail" title="E-mail the corresponding author
;
weverton.cordeiro@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
wlccordeiro@inf.ufrgs.br" class="auth_mail" title="E-mail the corresponding authorAuthor Vitae
;
Flá
;
vio Roberto Santosb
;
barata@chaordicsystems.com" class="auth_mail" title="E-mail the corresponding authorAuthor Vitae
;
Marinho Pilla Barcellosa
;
marinho@inf.ufrgs.br" class="auth_mail" title="E-mail the corresponding authorAuthor Vitae
;
Luciano Paschoal Gasparya
;
paschoal@inf.ufrgs.br" class="auth_mail" title="E-mail the corresponding authorAuthor Vitae
;
Hanna Kavalionakd
;
hanna.kavalionak@isti.cnr.it" class="auth_mail" title="E-mail the corresponding authorAuthor Vitae
;
Alessio Guerrieric
;
guerrieri@science.unitn.it" class="auth_mail" title="E-mail the corresponding authorAuthor Vitae
;
Alberto Montresorc
;
alberto.montresor@unitn.it" class="auth_mail" title="E-mail the corresponding authorAuthor Vitae
关键词:
Peer-to-peer networks
;
Identity management
;
Proof of work
;
Computational puzzles
;
Fake accounts
;
Sybil
attack
刊名:Computer Networks
年:2016
1
按检索点细分(2)
题名(1)
关键词(2)
摘要(1)
按年细分(2)
2016年(2)
按来源细分(2)
Elsevier(2)
按类型细分(2)
期刊(2)