[1] |
中国互联网络信息中心.第41次《中国互联网络发展状况统计报告》[R]. 2018.
|
|
CNNIC.The 41st “Statistical report on the development of China’s internet”[R]. 2018.
|
[2] |
史建焘, 张宏莉 . KAD网络负载均衡技术研究[J]. 电信科学, 2012,28(6): 68-72.
|
|
SHI J T , ZHANG H L . Study on load balancing of KAD network[J]. Telecommunications Science, 2012,28(6): 68-72.
|
[3] |
CHAN C , CHAN S . Distributed hash tables:design and applications[M]// Handbook of Peer-to-Peer Networking. Berlin:Springer Science, 2010: 257-280.
|
[4] |
DOUCEUR J R . The Sybil attack[J]. Lecture Notes in Computer Science, 2002,65(1): 251-260.
|
[5] |
肖禄, 黄韬, 刘江 ,等. 一种基于物理拓扑的 DHT 物联网解析机制[J]. 电信科学, 2012,28(6): 25-32.
|
|
XIAO L , HUANG T , LIU J ,et al. A novel resolution service for internet of things based on physically topological DHT[J]. Telecommunications Science, 2012,28(6): 25-32.
|
[6] |
JAN M A , NANDA P , HE X ,et al. A Sybil attack detection scheme for a forest wildfire monitoring application[J]. Future Generation Computer Systems, 2018(80): 613-626.
|
[7] |
WANG C , ZHU L , GONG L ,et al. Accurate sybil attack detection based on fine-grained physical channel information[J]. Sensors, 2018,18(3):878.
|
[8] |
BOTT J , MILKAU U . Towards a framework for the evaluation and design of distributed ledger technologies in banking and payments[J]. Journal of Payments Strategy & Systems, 2016,10(2): 153-171.
|
[9] |
WANG G , MUSAU F , GUO S ,et al. Neighbor similarity trustagainst sybil attack in P2P E-commerce[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(3): 824-833.
|
[10] |
ZHENG Y , LIN F , YANG Y ,et al. Adaptive resource scheduling mechanism in P2P file sharing system[J]. Peer-to-Peer Networking and Applications, 2016,9(6): 1089-1100.
|
[11] |
JAN M A , NANDA P , HE X ,et al. A Sybil attack detection scheme for a forest wildfire monitoring application[J]. Future Generation Computer Systems, 2018(80): 613-626.
|
[12] |
RAJA K N , BENO M M . Secure data aggregation in wireless sensor network-Fujisaki Okamoto (FO) authentication scheme against sybil attack[J]. Journal of medical systems, 2017,41(7):107.
|
[13] |
FREEDMAN M J , MORRIS R . Tarzan:a peer-to-peer anonymizing network layer[C]// The 9th ACM Conference on Computer and Communications Security,November 17-21,2002,Washington,DC,USA. New York:ACM Press, 2002: 193-206.
|
[14] |
RAJA K N , BENO M M . Secure data aggregation in wireless sensor network-Fujisaki Okamoto (FO) authentication scheme against sybil attack[J]. Journal of Medical Systems, 2017,41(7):107.
|
[15] |
MARTI S , GANESAN P , GARCIA-MOLINA H . DHT routing using social links[M]. Berlin: Springer Berlin HeidelbergPress, 2005: 100-111.
|
[16] |
DANEZIS G , LESNIEWSKI-LAAS C , KAASHOEK M ,et al. Sybil-resistant DHT routing[C]// The 10th European Symposium on Research in Computer Security,September 12-14,2005,Milan,Italy. Berlin:Springer, 2005: 305-318.
|
[17] |
YU H , KAMINSKY M , GIBBONS P B ,et al. Sybilguard:defending against sybil attacks via social networks[J]. IEEE/ACM Transactions on Networking, 2008,16(3): 576-589.
|
[18] |
YU H , GIBBONS P B , KAMINSKY M ,et al. Sybillimit:a near-optimal social network defense against Sybil attacks[J]. IEEE/ACM Transactions on Networking, 2010,18(3): 885-898.
|
[19] |
BOYD S , GHOSH A , PRABHAKAR B ,et al. Gossip algorithms:design analysis and applications[C]// IEEE INFOCOM 2005,March 13-17,2005,Miami,FL,USA. Piscataway:IEEE Press, 2005.
|
[20] |
FLAXMAN A D . Expansion and lack thereof in randomly perturbed graphs[J]. Internet Mathematics, 2007,4(2-3): 131-147.
|
[21] |
TRAN N , MIN B , LI J ,et al. Sybil-resilient online content voting[C]// The 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI’09),April 22-24,2009,Boston,Massachusetts,USA. New York:ACM Press, 2009: 15-28.
|
[22] |
LESNIEWSKI-LAAS C , . A Sybil-proof one-hop DHT[C]// The First Workshop on Social Network Systems (SocialNets’08),April 1,2008,Glasgow,Scotland,UK. New York:ACM Press, 2008: 19-24.
|
[23] |
LESNIEWSKI-LASS C , KAASHOEK M F . Whanau:aSybil-proof distributed hash table[C]// 7th USENIX Symposium on Network Design and Implementation,April 28-30,2010,San Jose,California,USA. New York:ACM Press, 2010: 3-17.
|
[24] |
MITTAL P , CAESAR M . X-Vine:secure and pseudonymous routing using social networks[J]. Corr, 2012.
|
[25] |
LIU B , WEI T , ZHANG C ,et al. Improving lookup reliability in KAD[J]. Peer-to-Peer Networking and Applications, 2015,8(1): 156-170.
|
[26] |
REZVANIAN A , MEYBODI M R . Sampling algorithms for weighted networks[J]. Social Network Analysis and Mining, 2016,6(1):60.
|
[27] |
KWAK H , LEE C , PARK H ,et al. What is Twitter,a social network or a news media?[C]// The 19th International Conference on World Wide Web,April 26-30,2010,Raleigh,NC,USA. New York:ACM Press, 2010: 591-600.
|