Back to Results
First PageMeta Content
Internet / Chord / Sybil attack / Routing / Kademlia / Small world routing / Distributed data storage / Computing / Network architecture


576 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 3, JUNE 2008 SybilGuard: Defending Against Sybil Attacks via Social Networks
Add to Reading List

Document Date: 2009-02-15 02:19:58


Open Document

File Size: 585,07 KB

Share Result on Facebook

City

Pisa / /

Company

SYBIL ATTACKS VIA SOCIAL NETWORKS / /

Country

Italy / United States / /

Currency

USD / /

/

Facility

National University of Singapore / Carnegie Mellon University / /

IndustryTerm

given social network / connected social network / dynamic social networks / online chat rooms / node network / decentralized distributed systems / static social network / p2p systems / logical network / incremental maintenance algorithm / real social network / decentralized systems / reputation systems / million-node social network / defense system protocol / social networks / decentralized protocol / social network / /

MarketIndex

SET 100 / /

MusicAlbum

Instead / /

Organization

Computer Science Department / National University of Singapore / Singapore / Central Authority / Carnegie Mellon University / Pittsburgh / /

Person

Phillip B. Gibbons / Haifeng Yu / Sybil Attacks / Michael Kaminsky / /

Position

driver / NETWORKING Editor / Private / /

ProvinceOrState

Manitoba / Pennsylvania / /

Technology

SybilGuard protocol / Peer-to-peer / p2p / private key / secret key / cryptography / V. SYBILGUARD UNDER DYNAMICS Our protocol / incremental maintenance algorithm / public key / DNS / file sharing / defense system protocol / simulation / actual SybilGuard protocol / Digital Object Identifier / /

SocialTag