Sybil

Results: 351



#Item
31Social networking services / Renren / Sybil attack / Sybil / Sibyl

../../plots/friend_degree.eps

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2011-09-16 13:04:38
32

Sybil-Resistant Mixing for Bitcoin George Bissias A. Pinar Ozisik Brian N. Levine

Add to Reading List

Source URL: forensics.umass.edu

Language: English - Date: 2014-09-13 10:28:31
    33Reputation management / Collaboration / Computing / EigenTrust / Reputation system / Peer-to-peer / Sybil attack / Online identity / Reputation / Social peer-to-peer processes / Trust metric

    Electron Commer Res: 239–270 DOIs10660y The design of a reliable reputation system Gayatri Swamynathan · Kevin C. Almeroth · Ben Y. Zhao

    Add to Reading List

    Source URL: www.cs.ucsb.edu

    Language: English - Date: 2010-12-04 23:25:19
    34Mathematics / Comics / Algebraic graph theory / Conductance / Matrices / Probability theory / Sybil attack / Marcus Junius Brutus the Younger / Dogmatix / Asterix / Renren / Fiction

    IEEE Symposium on Security & Privacy
 SAN FRANCISCO – 21ST MAY 2013 SoK: The Evolution of Sybil Defense via Social Networks
 Alessandro Epasto1

    Add to Reading List

    Source URL: www.epasto.org

    Language: English - Date: 2015-09-24 11:21:14
    35

    SoK: The Evolution of Sybil Defense via Social Networks Lorenzo Alvisi UT Austin Allen Clement MPI-SWS

    Add to Reading List

    Source URL: www.cs.utexas.edu

    Language: English - Date: 2013-03-08 13:56:21
      36Computing / Software / Digital media / Email / Social networking services / Webmail / Spamming / Social information processing / Renren / Sybil attack / Sybil / Gmail

      Jiang J, Shan ZF, Wang X et al . JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1– Mon. Year Understanding Sybil Groups in the Wild Jing Jiang1,2 (蒋 竞), Member, CCF, Zifei Shan2 (单子非), Xiao Wang2 (王 潇) Li Z

      Add to Reading List

      Source URL: www.zifeishan.org

      Language: English - Date: 2014-12-18 18:37:50
      37

      Towards a Sybil-resilient reputation metric for P2P applications Tien Tuan Anh Dinh, Mark Ryan School of Computer Science, University of Birmingham, United Kingdom {ttd,mdr}@cs.bham.ac.uk Abstract In this paper, we propo

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      Language: English - Date: 2009-04-30 08:46:38
        38Social networking services / Social information processing / Renren / Facebook / Crowdsourcing / Internet privacy / Social media / Amazon Mechanical Turk / Outlook.com

        Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang ‡ , Miriam Metzger† , Haitao Zheng and Ben Y. Zhao Department of Computer Science, U. C. Santa Barbara, CA USA

        Add to Reading List

        Source URL: www.cs.ucsb.edu

        Language: English - Date: 2012-12-04 02:43:44
        39

        An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks Murat Demirbas, Youngwhan Song Department of Computer Science and Engineering Department State University of New York at Buffalo Buffalo, NY 142

        Add to Reading List

        Source URL: www.cse.buffalo.edu

        Language: English - Date: 2007-11-26 13:31:21
          40Reputation management / Distributed data storage / File sharing / Distributed computing / Internet television / Gossip protocol / BitTorrent / Tribler / Peer-to-peer / Ono / Social peer-to-peer processes / Sybil attack

          QLectives – Socially Intelligent Systems for Quality Project noInstrument: Large-scale integrating project (IP) Programme: FP7-ICT Deliverable D2.1.2 Fundamental algorithms for sustaining cooperation in realis

          Add to Reading List

          Source URL: qlectives.eu

          Language: English - Date: 2011-03-31 12:53:40
          UPDATE