summaryrefslogtreecommitdiffstats
path: root/citati.bib
diff options
context:
space:
mode:
Diffstat (limited to 'citati.bib')
-rw-r--r--citati.bib8
1 files changed, 7 insertions, 1 deletions
diff --git a/citati.bib b/citati.bib
index 37d9097..a9e2bc1 100644
--- a/citati.bib
+++ b/citati.bib
@@ -201,4 +201,10 @@
abstract="Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these ``Sybil attacks'' is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.",
isbn="978-3-540-45748-0"
}
-
+@book{cedilnik12,
+ place={Radovljica},
+ title={Matematični Priročnik},
+ publisher={Didakta},
+ author={Cedilnik, Anton and Razpet, Nada and Razpet, Marko},
+ year={2012}
+}