Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
Scott WolchokOwen S. HofmannNadia HeningerEdward W. FeltenJ. Alex HaldermanChristopher J. RossbachBrent WatersEmmett WitchelPublished in: NDSS (2010)
Keyphrases
- low cost
- malicious users
- distributed systems
- countermeasures
- low power
- real time
- watermarking scheme
- traffic analysis
- highly efficient
- security threats
- digital camera
- terrorist attacks
- single chip
- malicious attacks
- chosen plaintext
- denial of service attacks
- detection mechanism
- data acquisition
- cryptographic protocols
- security mechanisms
- malicious nodes
- databases