Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1931811 - MaRDI portal

scientific article; zbMATH DE number 1931811

From MaRDI portal
Publication:4709170

zbMath1014.68882MaRDI QIDQ4709170

John R. Douceur

Publication date: 20 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2429/24290251.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Unnamed ItemDesigning Proof of Human-Work Puzzles for Cryptocurrency and BeyondSoK: communication across distributed ledgersInstant block confirmation in the sleepy modelMaximal information propagation via lotteriesWho are you? Secure identities in single hop ad hoc networksThe design of a reliable reputation systemBuilding a reputation-based bootstrapping mechanism for newcomers in collaborative alert systemsClone wars: distributed detection of clone attacks in mobile WSNsResource Burning for Permissionless Systems (Invited Paper)Algorand: a secure and efficient distributed ledgerPermissionless and asynchronous asset transferOptimizing scrip systems: crashes, altruists, hoarders, sybils and collusionTrust-Rated Authentication for Domain-Structured Distributed SystemsBuilding blocks of sharding blockchain systems: concepts, approaches, and open problemsDecentralizing information technology: the advent of resource based systemsZero-history confidential chains with zero-knowledge contracts: a new normal for decentralized ledgers?Deterministic secure positioning in wireless sensor networksBankrupting Sybil despite churnOn the establishment of distinct identities in overlay networksProportional scheduling, split-proofness, and merge-proofnessPromise: Leveraging Future Gains for Collateral ReductionDENIABLE GROUP COMMUNICATIONS IN THE PRESENCE OF GLOBAL UNLIMITED ADVERSARYEnsemble: Community-Based Anomaly Detection for Popular ApplicationsSelf-organized Anonymous Authentication in Mobile Ad Hoc NetworksCredibility dynamics: a belief-revision-based trust model with pairwise comparisonsAn ``S-string scheme for business-oriented peer-to-peer networksUnnamed ItemAgent incentives of strategic behavior in resource exchangeElectric routing and concurrent flow cuttingPricing traffic in a spanning networkUnnamed ItemFair and resilient incentive tree mechanismsTowards a scalable and robust DHTRobust random number generation for peer-to-peer systemsHop chains: Secure routing and the establishment of distinct identitiesTo catch a fake: Curbing deceptive Yelp ratings and venuesA paid message forwarding scheme based on social networkCommunities, Random Walks, and Social Sybil DefenseA resource-competitive jamming defenseAn improved incentive ratio of the resource sharing on cyclesThe sum of its parts: analysis of federated Byzantine agreement systemsComputing a consensus trajectory in a vehicular networkSecuring Ad Hoc Storage through Probabilistic Cooperation AssessmentAsynchronous reconfiguration with Byzantine failures