共 50 条
- [21] An Efficient Technique To Detect And Prevent Sybil Attacks In Social Network Applications 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
- [23] Effective Attacks in the Tor Authentication Protocol NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 81 - 86
- [24] A Privacy-Preserving Authentication and Sybil Detection Protocol for Vehicular Ad Hoc Networks 2014 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2014, : 428 - 429
- [25] Regional Blockchain for Vehicular Networks to Prevent 51% Attacks IEEE ACCESS, 2019, 7 : 95033 - 95045
- [27] Privacy Preserving Solution for the Protection Against Sybil Attacks in Vehicular Ad Hoc Networks 2013 6TH JOINT IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2013), 2013,
- [30] Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks 2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2019, : 383 - 386