summaryrefslogtreecommitdiffstats
path: root/citati.bib
diff options
context:
space:
mode:
authorAnton Luka Šijanec <anton@sijanec.eu>2023-07-02 22:01:05 +0200
committerAnton Luka Šijanec <anton@sijanec.eu>2023-07-02 22:01:05 +0200
commit4f8031a27285553746ac1c043e1f9b7bf885a7b0 (patch)
tree935008526a3b7450b9c8f8aaa67022b2d500884e /citati.bib
parentomrežja (diff)
downloadsola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar
sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar.gz
sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar.bz2
sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar.lz
sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar.xz
sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.tar.zst
sola-gimb-4-4f8031a27285553746ac1c043e1f9b7bf885a7b0.zip
Diffstat (limited to 'citati.bib')
-rw-r--r--citati.bib8
1 files changed, 7 insertions, 1 deletions
diff --git a/citati.bib b/citati.bib
index 37d9097..a9e2bc1 100644
--- a/citati.bib
+++ b/citati.bib
@@ -201,4 +201,10 @@
abstract="Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these ``Sybil attacks'' is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.",
isbn="978-3-540-45748-0"
}
-
+@book{cedilnik12,
+ place={Radovljica},
+ title={Matematični Priročnik},
+ publisher={Didakta},
+ author={Cedilnik, Anton and Razpet, Nada and Razpet, Marko},
+ year={2012}
+}