Sciweavers

16 search results - page 4 / 4
» A Novel Way of Computing Similarities between Nodes of a Gra...
Sort
View
SIGCOMM
2006
ACM
13 years 10 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...