Proof of work without all the work

D Gupta, J Saia, M Young - … of the 19th international conference on …, 2018 - dl.acm.org
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …

Phoenix: A weight-based network coordinate system using matrix factorization

Y Chen, X Wang, C Shi, EK Lua, X Fu… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Network coordinate (NC) systems provide a lightweight and scalable way for predicting the
distances, ie, round-trip latencies among Internet hosts. Most existing NC systems embed …

Scalable link-based relay selection for anonymous routing

M Sherr, M Blaze, BT Loo - … Symposium, PETS 2009, Seattle, WA, USA …, 2009 - Springer
The performance of an anonymous path can be described using many network metrics–eg,
bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have …

The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems

E Chan-Tin, D Feldman, N Hopper, Y Kim - Security and Privacy in …, 2009 - Springer
A network coordinate system assigns Euclidean “virtual” coordinates to every node in a
network to allow easy estimation of network latency between pairs of nodes that have never …

Cyber-physical systems security

D Gollmann, M Krotofil - The new codebreakers: Essays dedicated to …, 2016 - Springer
We argue that cyber-physical systems cannot be protected just by protecting their IT
infrastructure and that the CIA approach to security is insufficient. Rather, the IT components …

The frog-boiling attack: Limitations of secure network coordinate systems

E Chan-Tin, V Heorhiadi, N Hopper, Y Kim - ACM Transactions on …, 2011 - dl.acm.org
A network coordinate system assigns Euclidean “virtual” coordinates to every node in a
network to allow easy estimation of network latency between pairs of nodes that have never …

[PDF][PDF] A³: An Extensible Platform for Application-Aware Anonymity

M Sherr, A Mao, WR Marczak, W Zhou, BT Loo… - 2010 - core.ac.uk
This paper presents the design and implementation of Application-Aware Anonymity (A³), an
extensible platform for deploying anonymity-based services on the Internet. A³ allows …

Veracity, plausibility, and reputation

D Gollmann - Information Security Theory and Practice. Security …, 2012 - Springer
The canonical IT security properties are geared towards infrastructure security. The task of
an infrastructure security service is completed once data has been delivered to the …

Peace through superior puzzling: An asymmetric sybil defense

D Gupta, J Saia, M Young - 2019 IEEE International Parallel …, 2019 - ieeexplore.ieee.org
A common tool to defend against Sybil attacks is proof-of-work, whereby computational
puzzles are used to limit the number of Sybil participants. Unfortunately, current Sybil …

[HTML][HTML] Web3 Sybil avoidance using network latency

Q Stokkink, CU Ileri, D Epema, J Pouwelse - Computer Networks, 2023 - Elsevier
Web3 is emerging as the new Internet-interaction model that facilitates direct collaboration
between strangers without a need for prior trust between network participants and without …