diff options
author | Anton Luka Šijanec <anton@sijanec.eu> | 2023-07-02 22:01:05 +0200 |
---|---|---|
committer | Anton Luka Šijanec <anton@sijanec.eu> | 2023-07-02 22:01:05 +0200 |
commit | 4f8031a27285553746ac1c043e1f9b7bf885a7b0 (patch) | |
tree | 935008526a3b7450b9c8f8aaa67022b2d500884e /citati.bib | |
parent | omrežja (diff) | |
download | sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar.gz sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar.bz2 sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar.lz sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar.xz sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar.zst sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.zip |
Diffstat (limited to 'citati.bib')
-rw-r--r-- | citati.bib | 8 |
1 files changed, 7 insertions, 1 deletions
@@ -201,4 +201,10 @@ abstract="Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these ``Sybil attacks'' is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.", isbn="978-3-540-45748-0" } - +@book{cedilnik12, + place={Radovljica}, + title={Matematični Priročnik}, + publisher={Didakta}, + author={Cedilnik, Anton and Razpet, Nada and Razpet, Marko}, + year={2012} +} |