參考文獻:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.
中國環境保護集團上線區塊鏈碳資產核證平臺:金色財經報道,7月12日是2023年“全國低碳日”。記者從中國環境保護集團(中國環保)獲悉,由該集團設計開發的“中國環保區塊鏈碳資產核證平臺”正式上線,這是國內首個互聯網碳資產管理與核證平臺,可實現數字化技術與碳資產核證交融,為采用市場化手段促進行業綠色發展提供新思路。
中國環保是中國較早參與溫室氣體自愿減排項目開發的企業,多年來密切關注國際、國內碳交易政策導向和發展進程,持續跟蹤市場變化情況,積極運用區塊鏈、大數據、物聯網、云計算等新興技術,開展碳足跡、碳核查、碳資產管理業務,設計開發了“中國環保區塊鏈碳資產核證平臺”,并完成首例運用區塊鏈技術核證碳資產的交易。[2023/7/13 10:51:42]
Ancilia:ParaSpace被攻擊的根本原因發生在0xddde3合約的函數scaledBalanceOf()上:金色財經報道,據 Web3 網絡安全公司 Ancilia 報道,NFT 借貸協議 ParaSpace 被攻擊的根本原因發生在合約 0xddde38696fbe5d11497d72d8801f651642d62353 的函數 scaledBalanceOf() 上,該函數用于通過 supply() 函數計算用戶的抵押品。然而,通過在函數 getPooledApeByShares() 中操縱 APE 代幣的數量可以使 scaledBalanceOf() 返回一個大額值。用戶可以擁有大量抵押品,并使用它來借更多的資產。[2023/3/17 13:10:57]
Secret Labs創始人指控Secret Foundation缺乏透明度:1月29日消息,同為隱私公鏈項目Secret Network支持者的Secret Labs與Secret Foundation的分歧公開化。Secret Labs 的創始人兼首席執行官 Guy Zyskind 就 Secret Foundation 及其創始人 Tor Bair 過去的運作提出了一些問題。Zyskind 提出了關于基金會缺乏透明度的指控,據稱對場外交易交易處理不當造成約 250,000 美元的損失,并可能向倒閉的 Alameda 提供公開貸款。他斷言,Secret 基金會在 2021 年出售了大量 Secret 代幣,Bair 在沒有向社區披露的情況下兌現了其中的很大一部分。 Secret Foundation 創始人 Tor Bair 在很大程度上證實了這些斷言,并表示他們之前已經向 Secret Labs 披露過。Zyskind 呼吁將基金會重組為非營利組織,將其所有現有資金返還給社區。[2023/1/30 11:35:38]
Genesis資產負債表上有28億美元未償貸款,約30%發放給母公司DCG等關聯方:11月23日消息,據知情人士透露,加密交易和借貸機構Genesis Global的資產負債表上有28億美元的未償貸款,其中約30%的貸款發放給了關聯方,包括其母公司Barry Silbert's Digital Currency Group。其中,一家名為Genesis Global Capital的貸款子公司一直在向Genesis Global Trading貸款。在周二致股東的一封信中,Digital Currency GroupInc.創始人兼首席執行官Barry Silbert表示,公司間貸款是在正常業務過程中進行的。
此前報道,Genesis母公司DCG創始人兼首席執行官BarrySilbert透露,DCG對Genesis Global Capital有大約5.75億美元的負債,該負債將于2023年5月到期。Silbert還提醒投資者注意2032年6月到期的11億美元期票,并指出這與Genesis和Three Arrows Capital違約相關的負債有關。
Silbert表示,除此之外,DCG唯一的債務是由Eldridge領投的幾位貸方提供的3.5億美元信貸額度。DCG僅籌集了2500萬美元的股權資本,今年有望實現8億美元的收入。(彭博社)[2022/11/23 7:59:16]
中間件協議基礎設施Pocket Network與NEAR集成:5月17日消息,Web3 RPC中間件協議基礎設施Pocket Network(POKT)宣布與NEAR集成,以改善NEAR區塊鏈的網絡帶寬,同時為Web3開發人員提供更快的部署時間。
據稱,與NEAR的最新集成允許本地開發者在其他獲支持的區塊鏈上部署他們的應用程序,包括以太坊、Solana、Fuse、Avalanche、Harmony和Polygon。此外,通過與多個區塊鏈的集成,可以減少NEAR開發人員圍繞由于瓶頸或其他服務中斷而導致的單點故障的擔憂。(Cointelegraph)[2022/5/17 3:22:25]
價格高低并不是比特幣的全部,它背后的自由和公平,使得新世界的構建成為可能。而想要廢除舊世界的秩序,首先要改變世界由白人和男性主導的現狀.
1900/1/1 0:00:00作者|秦曉峰編輯|郝方舟出品|Odaily星球日報 近期,Twitter加密社區中流傳著一則消息:蘋果公司很快將宣布購買數十億美元的比特幣計劃.
1900/1/1 0:00:00Odaily星球日報譯者|念銀思唐摘要:-DeFi項目Aave的創始人表示,他將建立一個Twitter替代產品。-這個項目將在以太坊上運行.
1900/1/1 0:00:00作者:blackfever元宇宙的概念逐漸深入人心,成為近期區塊鏈行業熱議的重點。本篇報告將從元宇宙的概念、現有元宇宙產品分析洞察以及元未來預測等方面,深度分析元宇宙的發展趨勢.
1900/1/1 0:00:00任何沒有在巖石下生活的人都聽說過Bitcoin。人們對Bitcoin是否"只是一種時尚"的爭論已經持續了很長時間。我們并不聲稱自己是經濟學家,也不是讀心者.
1900/1/1 0:00:00Odaily星球日報譯者|Moni 在史上最大規模礦工遷移之后,全網算力和挖礦難度都出現暴跌,但比特幣網絡似乎很快就適應了市場變化.
1900/1/1 0:00:00