Sybil attack

Results: 61



#Item
11

An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks Murat Demirbas, Youngwhan Song Department of Computer Science and Engineering Department State University of New York at Buffalo Buffalo, NY 142

Add to Reading List

Source URL: www.cse.buffalo.edu

Language: English - Date: 2007-11-26 13:31:21
    12Reputation management / Distributed data storage / File sharing / Distributed computing / Internet television / Gossip protocol / BitTorrent / Tribler / Peer-to-peer / Ono / Social peer-to-peer processes / Sybil attack

    QLectives – Socially Intelligent Systems for Quality Project noInstrument: Large-scale integrating project (IP) Programme: FP7-ICT Deliverable D2.1.2 Fundamental algorithms for sustaining cooperation in realis

    Add to Reading List

    Source URL: qlectives.eu

    Language: English - Date: 2011-03-31 12:53:40
    13Computing / Distributed data storage / Concurrent computing / File sharing / Distributed computing architecture / Network architecture / Dark web / Distributed hash table / Freenet / Sybil attack / Kademlia / Overlay network

    PDF Document

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2009-08-11 22:57:58
    14Algebraic graph theory / Probability theory / Conductance / Matrices / Connectivity / Graphical model / Sybil attack / Degree distribution / Network science / Graph theory / Mathematics / Networks

    2013 IEEE Symposium on Security and Privacy SoK: The Evolution of Sybil Defense via Social Networks Lorenzo Alvisi UT Austin

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2013-04-05 19:56:40
    15Computing / Technology / Peer-to-peer / Distributed hash table / Sybil attack / Routing / David Karger / Support / Wireless ad-hoc network / Wireless networking / Distributed data storage / File sharing networks

    Jinyang Li Phone: ( Broadway Rm 708 New York, NY 10003

    Add to Reading List

    Source URL: www.news.cs.nyu.edu

    Language: English - Date: 2013-09-27 13:48:02
    16Network flow / Reputation management / Sybil attack / Reputation system / Flow network / Breadth-first search / Degree distribution / Graph / Topology / Graph theory / Mathematics / Combinatorics

    Sybil-Resilient Online Content Voting Nguyen Tran, Bonan Min, Jinyang Li, and Lakshminarayanan Subramanian New York University Abstract Obtaining user opinion (using votes) is essential to ranking user-generated online c

    Add to Reading List

    Source URL: www.news.cs.nyu.edu

    Language: English - Date: 2009-03-02 14:36:27
    17Communications protocol / Data transmission / Protocols / Adversarial system / Social peer-to-peer processes / Sybil attack / Peer-to-peer / Adversary / Inference / Information / Data / Logic

    A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

    Add to Reading List

    Source URL: www.eecs.harvard.edu

    Language: English - Date: 2004-05-31 19:56:00
    18Social information processing / Node / Sybil attack / Reputation / Computing / Reputation management / Distributed data storage / Reputation system

    A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger EPFL-IC-LCA CH-1015 Lausanne, Switzerland

    Add to Reading List

    Source URL: www.eecs.harvard.edu

    Language: English - Date: 2004-05-28 15:48:54
    19Search algorithms / Error detection and correction / Hash function / Information retrieval / Artificial intelligence / SHA-1 / Bloom filter / Sybil attack / Hashing / Cryptography / Cryptographic hash functions

    582 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 3, MARCH 2011 P2DAP – Sybil Attacks Detection in Vehicular Ad Hoc Networks

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2012-03-12 23:31:44
    20Bootstrapping node / Distributed hash table / Chord / Pastry / Peer-to-peer / Sybil attack / B-tree / GiFT / Node / Distributed data storage / Computing / Software

    Limiting Sybil Attacks in Structured P2P Networks Hosam Rowaihy, William Enck, Patrick McDaniel, and Thomas La Porta Department of Computer Science and Engineering Pennsylvania State University University Park, PA 16802

    Add to Reading List

    Source URL: www.enck.org

    Language: English
    UPDATE