參考文獻:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.
數據:2022年以太坊占據所有區塊空間費用的80%,BNB Chain占據剩余的80%:1月3日消息,加密研究員Data_Always發布文章表示,2022年以太坊占據所有區塊空間費用的80%,BNB Chain占據了剩余費用的80%,而最大的簡單傳輸模型(Bitcoin、Dogecoin和Litecoin)相比之下僅占微不足道的費用。在Otherdeed NFT鑄造的一天里,以太坊上產生的費用就超過了2022年比特幣全年費用。
L2使用的Gas份額增加了兩倍,但采用率仍不高,但隨著EIP-4844的推出可能會改善。對于以太坊而言,必須繼續擴展并優先考慮協議的可用性,盡管費用將始終是KPI,但擴展速度比采用速度快是新的目標,這將是推高價格和鞏固以太坊在加密生態系統的關鍵。
盡管采取補貼交易模式,Tron在區塊空間需求上仍超過了比特幣,并且全年費用保持相對穩定,最重要原因是Tron對低價值USDT轉賬的捕獲。比特幣閃電網絡尚未看到有意義的增長,對閃電網絡采用預期過于樂觀,大部分交易費用峰值可歸因于加密機構的崩潰。[2023/1/3 22:22:25]
Terra驗證者向安全審計員SCV贈款90萬美元:金色財經報道,Terra驗證者周一投票通過向安全審計員SCV Security提供900,000美元的贈款來擴大其安全措施。SCV將識別和監控第二版協議的漏洞、風險和潛在威脅。SCV自稱是Terra的“值得信賴的安全提供商”,并表示已在整個Terra生態系統中開展白帽網絡安全工作,并直接與Terraform Labs合作。SCV首席執行官Vinicious Marino表示,SCV將采取“主動方法”通過積極監控項目來確保Terra網絡的安全。[2022/12/13 21:40:37]
金融時報:Celsius CEO在公司申請破產前幾個月控制了公司交易策略:8月16日消息,加密借貸平臺Celsius Network首席執行官 Alex Mashinsky 在公司申請破產前幾個月控制了 Celsius 的交易策略,今年1月份,Alex Mashinsky召集公司投資團隊,告訴他們其將在即將召開的美聯儲會議之前控制公司交易策略。據多位知情人士透露,在美聯儲會議前幾天,Alex Mashinsky自己指導交易,并否決了擁有數十年金融經驗的高管的建議。一些知情人士表示,Celsius在1月份的交易損失為5000萬美元,但尚不清楚有多少是由Mashinsky造成的。另一位知情人士透露,Celsius在其GBTC交易中的總損失約為1億至1.25億美元。
《金融時報》報道稱,有一次,Alex Mashinsky下令出售價值數億美元的比特幣,而且沒有仔細檢查資產持有情況(當時Celsius持有220億美元的客戶加密資產),一天后又虧本買回了這些比特幣。(英國《金融時報》)[2022/8/16 12:28:59]
以太坊分叉項目EthereumPow:分叉后將廢除EIP-1559:8月10日消息,據以太坊分叉項目EthereumPow官方聲明,分叉后的PoW以太坊不會繼承目前基于每筆交易支付Base Fee的以太坊銷毀機制EIP-1559。在合并更新升級之后,EthereumPow將與PoS鏈區分開來,目標是變得完全自治和自我維持且沒有任何治理實體,該目標將在未來三年內實現。[2022/8/10 12:16:25]
美國滑板巨星Tony Hawk在Sandbox推出虛擬滑板公園和3D頭像集合:金色財經消息,美國滑板巨星、極限運動員兼企業家Tony Hawk周三宣布將在以太坊游戲The Sandbox中創建一個滑板公園和3D頭像集合,該滑板公園將跨越游戲土地的36個地塊(Land),使其成為“有史以來最大的虛擬滑板公園”。此次發行是與Autograph合作推出的,Autograph是一個由美國NFL球星Tom Brady創立的NFT平臺,Hawk去年12月在該平臺上發布了他的第一個NFT系列。
Hawk表示,“我一生都是新技術的粉絲,從第一款具有CGI功能的視頻游戲和家用電腦開始。所以我對元宇宙很著迷,很高興能將我們的文化帶入The Sandbox的虛擬世界中”。[2022/7/14 2:11:54]
Tags:ANDINGORKCOMGriffin LandLightening Cashchianetworkcombo幣怎么樣
本文來自AscendEX研究院,星球日報經授權轉載。在YouTube網站上,用戶隨時可以看到包羅萬象的視頻內容,最近幾年開始催生出了一份新鮮職業——Youtuber,也是大家常口中說的「視頻博主.
1900/1/1 0:00:00以分布式賬本為代表的比特幣被區塊鏈行業共識為區塊鏈1.0,以智能合約為代表的以太坊為區塊鏈2.0,對于行業來說,其意義都是里程碑式的.
1900/1/1 0:00:00文|梁雨山正如DeFi的爆發令人始料未及,NFT于年初以來的發展勢頭同樣出乎多數人的意料。今年1月開始,數字收藏卡NBATopShot銷售額陡增,于2月當月突破2億美元,促進加密貨幣市場將目光轉.
1900/1/1 0:00:00公開數據顯示,2021年第一季度全球NFT資產交易總規模高達20億美元,環比增長20倍,呈現井噴的勢態.
1900/1/1 0:00:00DeeperNetwork2018年成立于美國硅谷,是一支由技術驅動力的團隊,核心成員來自英特爾、亞馬遜和CMC等公司.
1900/1/1 0:00:00毫無疑問,比特幣是加密貨幣的統治者。然而,盡管比特幣作為數字黃金取得了成功,但在其目前的狀態下,它只是用于持有.
1900/1/1 0:00:00