Sybil attack

Results: 61



#Item
31Reputation management / Sybil attack / Distributed hash table / Connectivity / Mathematics / Computing / Electronics / Kademlia / Small world routing / Distributed data storage / Networks / Network theory

SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks Haifeng Yu National University of Singapore Michael Kaminsky Intel Research Pittsburgh

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-07-13 06:52:18
32Sybil attack / Public-key cryptography / Information society / Collective intelligence / Consensus / Sybil / Digg / Electronic voting / Social information processing / Collaboration / Reputation system

DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu∗ , Chenwei Shi† , Michael Kaminsky‡ , Phillip B. Gibbons§ and Feng Xiao¶ ∗ School of Computing, National University of Singapore, Singapore

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-03-07 00:15:58
33Distributed computing / Chord / Routing / Sybil attack / Peer-to-peer / Node / Breadth-first search / Small world routing / Kademlia / Distributed data storage / Computing / Concurrent computing

In Proceedings of the ACM SIGCOMM Conference on Computer Communications (SIGCOMM 2006), Pisa, Italy, September 2006 SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2006-11-02 03:38:56
34Internet / Chord / Sybil attack / Routing / Kademlia / Small world routing / Distributed data storage / Computing / Network architecture

576 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 3, JUNE 2008 SybilGuard: Defending Against Sybil Attacks via Social Networks

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-02-15 02:19:58
35Sybil attack / Reputation system / Information society / Consensus / Collective intelligence / Sybil / Public-key cryptography / Digg / Social information processing / Collaboration / Reputation management

DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu∗ , Chenwei Shi† , Michael Kaminsky‡ , Phillip B. Gibbons§ and Feng Xiao¶ ∗ School of Computing, National University of Singapore, Singapore

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-04-09 06:30:09
36Spamming / Internet ethics / Email / Reputation management / Sybil attack / Anonymity / Online identity / Pseudonymous remailer / Pseudonym / Internet / Computing / Internet privacy

An Offline Foundation for Online Accountable Pseudonyms Bryan Ford Jacob Strauss

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-11-10 14:15:06
37Reputation management / Sybil attack / Internet privacy / Anonymity / Spamming / Online identity / Pseudonym / Spam / CAPTCHA / Internet / Computing / Email

An Offline Foundation for Accountable Pseudonyms Bryan Ford Jacob Strauss MIT CSAIL SocialNets

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-11-10 14:15:06
38Chord / Peer-to-peer / Tree / Sybil attack / Kademlia / BATON Overlay / Distributed data storage / Computing / Distributed hash table

Sybil-resistant DHT routing George Danezis1 , Chris Lesniewski-Laas2, M. Frans Kaashoek2 , and Ross Anderson1 1 2

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:16
39Reputation management / Distributed data storage / Distributed computing / Peer-to-peer computing / Peer-to-peer / EigenTrust / Reputation system / Ono / Sybil attack / File sharing networks / Computing / Concurrent computing

Fighting Peer-to-Peer SPAM and Decoys with Object Reputation Kevin Walsh Emin Gun ¨ Sirer

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-06-22 21:28:09
40Concurrent computing / Software / Distributed hash table / File sharing / Kademlia / BitTorrent / Vanish / Peer-to-peer / Sybil attack / Distributed data storage / Computing / File sharing networks

For more information and the most recent version of this paper, visit http://z.cs.utexas.edu/users/osa/unvanish/ Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs Scott Wolchok†1 , Owen S. Hofmann†2 ,

Add to Reading List

Source URL: z.cs.utexas.edu

Language: English - Date: 2009-09-29 13:35:27
UPDATE