Sybil attack

Results: 61



#Item
1Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:41
2Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal  Krishna P. Gummadi

Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal Krishna P. Gummadi

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-02-20 17:16:43
3Taxonomy of Trust: Categorizing P2P Reputation Systems ! Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}cs.stanford.edu

Taxonomy of Trust: Categorizing P2P Reputation Systems ! Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}cs.stanford.edu

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-11-08 11:13:55
4Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max

Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2011-12-17 12:10:14
5Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS

Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2015-09-11 18:12:25
6The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks Oana Goga Giridhari Venkatadri

The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks Oana Goga Giridhari Venkatadri

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2015-09-11 04:02:46
7../../plots/friend_degree.eps

../../plots/friend_degree.eps

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2011-09-16 13:04:38
8Electron Commer Res: 239–270 DOIs10660y The design of a reliable reputation system Gayatri Swamynathan · Kevin C. Almeroth · Ben Y. Zhao

Electron Commer Res: 239–270 DOIs10660y The design of a reliable reputation system Gayatri Swamynathan · Kevin C. Almeroth · Ben Y. Zhao

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2010-12-04 23:25:19
9IEEE Symposium on Security & Privacy
 SAN FRANCISCO – 21ST MAY 2013 SoK: The Evolution of Sybil Defense via Social Networks
 Alessandro Epasto1

IEEE Symposium on Security & Privacy
 SAN FRANCISCO – 21ST MAY 2013 SoK: The Evolution of Sybil Defense via Social Networks
 Alessandro Epasto1

Add to Reading List

Source URL: www.epasto.org

Language: English - Date: 2015-09-24 11:21:14
10Jiang J, Shan ZF, Wang X et al . JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1– Mon. Year Understanding Sybil Groups in the Wild Jing Jiang1,2 (蒋 竞), Member, CCF, Zifei Shan2 (单子非), Xiao Wang2 (王 潇) Li Z

Jiang J, Shan ZF, Wang X et al . JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1– Mon. Year Understanding Sybil Groups in the Wild Jing Jiang1,2 (蒋 竞), Member, CCF, Zifei Shan2 (单子非), Xiao Wang2 (王 潇) Li Z

Add to Reading List

Source URL: www.zifeishan.org

Language: English - Date: 2014-12-18 18:37:50