2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking &Amp; Services 2006
DOI: 10.1109/mobiq.2006.340426
|View full text |Cite
|
Sign up to set email alerts
|

Byzantine Generals Problem in the Light of P2P Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Theoretically a malicious node should take almost the 51% of the computational power of the entire network of blockchain to get successful in an attempt to generate a fake block and realize a double spending attack. Double-spending issues are well known studied as also the presence of malicious nodes in the Generals Byzantine fault issues (Fan et al, 2013;Fedotova and Veltri, 2006;Reischuk, 1985;Lamport, 1983). These two computer technology conditions appeared in a computer network when some of the nodes of the network are malicious ones as inserts unreliable information: to be sure that the entire will agree on a concerted strategy to avoid a collapse, the system should be reinforced.…”
Section: Bitcoin and Blockchain Technologymentioning
confidence: 99%
“…Theoretically a malicious node should take almost the 51% of the computational power of the entire network of blockchain to get successful in an attempt to generate a fake block and realize a double spending attack. Double-spending issues are well known studied as also the presence of malicious nodes in the Generals Byzantine fault issues (Fan et al, 2013;Fedotova and Veltri, 2006;Reischuk, 1985;Lamport, 1983). These two computer technology conditions appeared in a computer network when some of the nodes of the network are malicious ones as inserts unreliable information: to be sure that the entire will agree on a concerted strategy to avoid a collapse, the system should be reinforced.…”
Section: Bitcoin and Blockchain Technologymentioning
confidence: 99%
“…However, the autonomy of nodes leads to the diversity of the actions of P2P nodes, which induces the routing to be easily disserved by malicious behaviors of the nodes. End-nodes in the routing can take malicious actions [1] such as free-riding [2] , forgery attack [3] , collusion [4] and betrayal [5] , etc. Take P2P file-sharing application as an example, 25% of the files are forged documents or viruses [6] .…”
Section: Introductionmentioning
confidence: 99%
“…According to the statistic [2], 60-70% of network bandwidth is consumed by the various P2P applications in the Internet. At the same time, some malicious actions such as forgery attack [3], collusion [4], whitewashing [1] [5] and betrayal [6] still exist. To P2P file-sharing application as an example, 25% of the documents are forged documents or virus [7].…”
Section: Introductionmentioning
confidence: 99%