Sybil attack

Results: 61



#Item
51Network theory / Distributed data storage / Reputation management / Sybil attack / Community structure / Modularity / Distributed hash table / Degree distribution / Sybil / Graph theory / Networks / Mathematics

An Analysis of Social Network-Based Sybil Defenses Bimal Viswanath Ansley Post MPI-SWS

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2010-07-29 15:52:43
52Sybil / Networks / Electromagnetism / Community structure / Topology / Film / Electronics / Reputation management / Sybil attack / Reputation system

Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2011-12-17 12:10:14
53Chord / Sybil attack / Routing / Peer-to-peer / Node / Small world routing / Kademlia / Distributed data storage / Computing / Network architecture

SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu

Add to Reading List

Source URL: www.csd.uoc.gr

Language: English - Date: 2008-02-20 12:43:42
54Graph theory / Computing / Network theory / Chord / Node / Peer-to-peer / Routing / Topology / Sybil attack / Distributed data storage / Networks / Electronics

On Network formation, (Sybil attacks and Reputation systems) (Position Paper)

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2007-01-11 10:31:39
55Computational trust / Advogato / Robustness / Sybil attack / Trust management / Computing / Human behavior / Collective intelligence / Reputation management / Reputation system / Trust metric

5th International Workshop on Security and Trust Management (STM 2009), Saint Malo, France, September 2009.

Add to Reading List

Source URL: folk.uio.no

Language: English - Date: 2012-04-25 01:16:59
56Public-key cryptography / Law / Social psychology / Key management / Security / Trust metric / Reputation system / Trust / Sybil attack / Reputation management / Ethics / Sociology

A Survey on Trust Management for Intelligent Transportation System Shuo Ma, Ouri Wolfson

Add to Reading List

Source URL: www.cs.uic.edu

Language: English - Date: 2012-02-22 23:11:01
57Trust metric / Sybil attack / Collective intelligence / Computing / Searching / CheiRank / Reputation management / Advogato / PageRank

A comparison of two trust metrics Jesse Ruderman UCSD CSE 202 Fall 2004

Add to Reading List

Source URL: www.squarefree.com

Language: English - Date: 2004-12-15 11:46:43
58Distributed hash table / Sybil attack / Peer-to-peer / Routing / Kademlia / Koorde / Distributed data storage / Computing / Chord

PDF Document

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2008-03-20 17:47:17
59Distributed hash table / Kademlia / Peer-to-peer / Sybil attack / Statistics / Hash table / Subnetwork / Kullback–Leibler divergence / Distributed data storage / Computing / Network architecture

PDF Document

Add to Reading List

Source URL: hal.inria.fr

Language: English - Date: 2010-06-21 05:56:10
UPDATE