Back to Results
First PageMeta Content
Computer network security / Reputation management / Sybil attack / Distributed data storage / Cryptocurrencies / Networks / Reputation system / Sibyl / Distributed hash table / Sybil / Dash / Community structure


Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max
Add to Reading List

Document Date: 2011-12-17 12:10:14


Open Document

File Size: 269,53 KB

Share Result on Facebook