Selfied: Sybil defense in permissionless blockchains via in-protocol bandwidth consumption. Hou, R., Yu, H., & Sun, Y. Comput. Networks, 256:110890, 2025.
Paper doi bibtex @article{DBLP:journals/cn/HouYS25,
author = {Ruomu Hou and
Haifeng Yu and
Yucheng Sun},
title = {Selfied: Sybil defense in permissionless blockchains via in-protocol
bandwidth consumption},
journal = {Comput. Networks},
volume = {256},
pages = {110890},
year = {2025},
url = {https://doi.org/10.1016/j.comnet.2024.110890},
doi = {10.1016/J.COMNET.2024.110890},
timestamp = {Tue, 26 Nov 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/cn/HouYS25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"h4ST49stGM85PgWwd","bibbaseid":"hou-yu-sun-selfiedsybildefenseinpermissionlessblockchainsviainprotocolbandwidthconsumption-2025","author_short":["Hou, R.","Yu, H.","Sun, Y."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Ruomu"],"propositions":[],"lastnames":["Hou"],"suffixes":[]},{"firstnames":["Haifeng"],"propositions":[],"lastnames":["Yu"],"suffixes":[]},{"firstnames":["Yucheng"],"propositions":[],"lastnames":["Sun"],"suffixes":[]}],"title":"Selfied: Sybil defense in permissionless blockchains via in-protocol bandwidth consumption","journal":"Comput. Networks","volume":"256","pages":"110890","year":"2025","url":"https://doi.org/10.1016/j.comnet.2024.110890","doi":"10.1016/J.COMNET.2024.110890","timestamp":"Tue, 26 Nov 2024 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/cn/HouYS25.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/cn/HouYS25,\n author = {Ruomu Hou and\n Haifeng Yu and\n Yucheng Sun},\n title = {Selfied: Sybil defense in permissionless blockchains via in-protocol\n bandwidth consumption},\n journal = {Comput. Networks},\n volume = {256},\n pages = {110890},\n year = {2025},\n url = {https://doi.org/10.1016/j.comnet.2024.110890},\n doi = {10.1016/J.COMNET.2024.110890},\n timestamp = {Tue, 26 Nov 2024 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/cn/HouYS25.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n","author_short":["Hou, R.","Yu, H.","Sun, Y."],"key":"DBLP:journals/cn/HouYS25","id":"DBLP:journals/cn/HouYS25","bibbaseid":"hou-yu-sun-selfiedsybildefenseinpermissionlessblockchainsviainprotocolbandwidthconsumption-2025","role":"author","urls":{"Paper":"https://doi.org/10.1016/j.comnet.2024.110890"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/227/7172.html?view=bibtex","dataSources":["9K9gYzSH9ayovEtAc"],"keywords":[],"search_terms":["selfied","sybil","defense","permissionless","blockchains","via","protocol","bandwidth","consumption","hou","yu","sun"],"title":"Selfied: Sybil defense in permissionless blockchains via in-protocol bandwidth consumption","year":2025}