Sciweavers

2 search results - page 1 / 1
» An analysis of social network-based Sybil defenses
Sort
View
122
Voted
SIGCOMM
2010
ACM
15 years 18 days ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
139
Voted
INFOCOM
2012
IEEE
13 years 2 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li