Sybil attack

Results: 61



#Item
1Computing / Internet / Network architecture / File sharing / Computer networking / Distributed computing architecture / Overlay network / Routing / Round-trip delay time / Peer-to-peer / Sybil attack / Tor

Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:41
2Distributed data storage / Computer network security / Reputation management / Sybil attack / Distributed hash table / Routing / Flow network / Distributed computing

Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal Krishna P. Gummadi

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-02-20 17:16:43
3File sharing / Reputation management / Distributed data storage / Peer-to-peer computing / Peer-to-peer / EigenTrust / Sybil attack / Social peer-to-peer processes / Distributed hash table / Reputation system / Distributed computing / Anonymous P2P

Taxonomy of Trust: Categorizing P2P Reputation Systems ! Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}cs.stanford.edu

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-11-08 11:13:55
4Computer network security / Reputation management / Sybil attack / Distributed data storage / Cryptocurrencies / Networks / Reputation system / Sibyl / Distributed hash table / Sybil / Dash / Community structure

Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2011-12-17 12:10:14
5Computer network security / Reputation management / Sybil attack / Yelp / Sibyl / Sybil

Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2015-09-11 18:12:25
6Cybercrime / Twitter / Phishing / Identity theft / Klout / Social engineering / Spamming / Impersonator / Sybil attack / Internet bot

The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks Oana Goga Giridhari Venkatadri

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2015-09-11 04:02:46
7Social networking services / Renren / Sybil attack / Sybil / Sibyl

../../plots/friend_degree.eps

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2011-09-16 13:04:38
8Reputation management / Collaboration / Computing / EigenTrust / Reputation system / Peer-to-peer / Sybil attack / Online identity / Reputation / Social peer-to-peer processes / Trust metric

Electron Commer Res: 239–270 DOIs10660y The design of a reliable reputation system Gayatri Swamynathan · Kevin C. Almeroth · Ben Y. Zhao

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2010-12-04 23:25:19
9Mathematics / Comics / Algebraic graph theory / Conductance / Matrices / Probability theory / Sybil attack / Marcus Junius Brutus the Younger / Dogmatix / Asterix / Renren / Fiction

IEEE Symposium on Security & Privacy
 SAN FRANCISCO – 21ST MAY 2013 SoK: The Evolution of Sybil Defense via Social Networks
 Alessandro Epasto1

Add to Reading List

Source URL: www.epasto.org

Language: English - Date: 2015-09-24 11:21:14
10Computing / Software / Digital media / Email / Social networking services / Webmail / Spamming / Social information processing / Renren / Sybil attack / Sybil / Gmail

Jiang J, Shan ZF, Wang X et al . JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1– Mon. Year Understanding Sybil Groups in the Wild Jing Jiang1,2 (蒋 竞), Member, CCF, Zifei Shan2 (单子非), Xiao Wang2 (王 潇) Li Z

Add to Reading List

Source URL: www.zifeishan.org

Language: English - Date: 2014-12-18 18:37:50
UPDATE