diff options
Diffstat (limited to '')
-rw-r--r-- | citati.bib | 59 |
1 files changed, 59 insertions, 0 deletions
@@ -143,3 +143,62 @@ url = {https://dis-slovarcek.ijs.si/}, urldate = {2023-02-28} } +@online{rhilip20, + author = {Rhilip}, + year = {2020}, + urldate = {2023-02-28}, + url = {https://github.com/Rhilip/Bencode}, + title = {A pure and simple PHP library for encoding and decoding Bencode data} +} +@conference{Kluyver2016jupyter, + Title = {Jupyter Notebooks -- a publishing format for reproducible computational workflows}, + Author = {Thomas Kluyver and Benjamin Ragan-Kelley and Fernando P{\'e}rez and Brian Granger and Matthias Bussonnier and Jonathan Frederic and Kyle Kelley and Jessica Hamrick and Jason Grout and Sylvain Corlay and Paul Ivanov and Dami{\'a}n Avila and Safia Abdalla and Carol Willing}, + Booktitle = {Positioning and Power in Academic Publishing: Players, Agents and Agendas}, + Editor = {F. Loizides and B. Schmidt}, + Organization = {IOS Press}, + Pages = {87 - 90}, + Year = {2016} +} +@online{sampleih, + author = {The 8472}, + url = {https://www.bittorrent.org/beps/bep_0051.html}, + title = {DHT Infohash Indexing}, + urldate = {2023-02-28}, + year = {2017} +} +@Article{Hunter:2007, + Author = {Hunter, J. D.}, + Title = {Matplotlib: A 2D graphics environment}, + Journal = {Computing in Science \& Engineering}, + Volume = {9}, + Number = {3}, + Pages = {90--95}, + abstract = {Matplotlib is a 2D graphics package used for Python for + application development, interactive scripting, and publication-quality + image generation across user interfaces and operating systems.}, + publisher = {IEEE COMPUTER SOC}, + doi = {10.1109/MCSE.2007.55}, + year = 2007 +} +@online{norberg14, + author = {Norberg, Arvid}, + title = {DHT Security extension}, + url = {https://www.bittorrent.org/beps/bep_0042.html}, + urldate = {2023-02-28}, + year = {2016} +} +@InProceedings{10.1007/3-540-45748-8_24, + author="Douceur, John R.", + editor="Druschel, Peter + and Kaashoek, Frans + and Rowstron, Antony", + title="The Sybil Attack", + booktitle="Peer-to-Peer Systems", + year="2002", + publisher="Springer Berlin Heidelberg", + address="Berlin, Heidelberg", + pages="251--260", + abstract="Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these ``Sybil attacks'' is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.", + isbn="978-3-540-45748-0" +} + |