Sciweavers

21 search results - page 5 / 5
» Vulnerabilities and Security Limitations of current IP Telep...
Sort
View
SIGCOMM
2010
ACM
13 years 5 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...