Double-spending with a sybil attack in the bitcoin decentralized network
A double-spend attack is one of the major security issues in most blockchain systems, but it
is difficult to successfully launch unless an adversary has massive computing power. In this …
is difficult to successfully launch unless an adversary has massive computing power. In this …
Peer-to-peer federated continual learning for naturalistic driving action recognition
Naturalistic driving action recognition (NDAR) has proven to be an effective method for
detecting driver distraction and reducing the risk of traffic accidents. However, the intrusive …
detecting driver distraction and reducing the risk of traffic accidents. However, the intrusive …
A survey on network coordinates systems, design, and security
During the last decade, a new class of large-scale globally-distributed network services and
applications have emerged. Those systems are flexible in the sense that they can select …
applications have emerged. Those systems are flexible in the sense that they can select …
Security and privacy issues in P2P streaming systems: A survey
Abstract Streaming applications over Peer-To-Peer (P2P) systems have gained an
enormous popularity. Success always implies increased concerns about security, protection …
enormous popularity. Success always implies increased concerns about security, protection …
[PDF][PDF] Exploring Link Correlation for Efficient Flooding in Wireless Sensor Networks.
Existing flooding algorithms have demonstrated their effectiveness in achieving
communication efficiency and reliability in wireless sensor networks. However, further …
communication efficiency and reliability in wireless sensor networks. However, further …
Decentralized utility-and locality-aware replication for heterogeneous DHT-based P2P cloud storage systems
As a Distributed Hash Table (DHT), Skip Graph routing overlays are exploited in several
peer-to-peer (P2P) services, including P2P cloud storage. The fully decentralized replication …
peer-to-peer (P2P) services, including P2P cloud storage. The fully decentralized replication …
Achieving efficient flooding by utilizing link correlation in wireless sensor networks
Although existing flooding protocols can provide efficient and reliable communication in
wireless sensor networks on some level, further performance improvement has been …
wireless sensor networks on some level, further performance improvement has been …
Sok: understanding BFT consensus in the age of blockchains
Blockchain as an enabler to current Internet infrastructure has provided many unique
features and revolutionized current distributed systems into a new era. Its decentralization …
features and revolutionized current distributed systems into a new era. Its decentralization …
Self-stabilizing byzantine resilient topology discovery and message delivery
Traditional Byzantine resilient algorithms use 2 f+ 1 vertex-disjoint paths to ensure message
delivery in the presence of up to f Byzantine nodes. The question of how these paths are …
delivery in the presence of up to f Byzantine nodes. The question of how these paths are …
On optimizing overlay topologies for search in unstructured peer-to-peer networks
HC Hsiao, HW Su - IEEE Transactions on Parallel and …, 2011 - ieeexplore.ieee.org
Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As
the peers participating in unstructured networks interconnect randomly, they rely on flooding …
the peers participating in unstructured networks interconnect randomly, they rely on flooding …