Sciweavers

98 search results - page 7 / 20
» Limiting Sybil Attacks in Structured P2P Networks
Sort
View
PERCOM
2006
ACM
15 years 11 months ago
Dynamic Peer-To-Peer Overlays for Voice Systems
Different devices, such as mobile phones, soft phones, or desktop phones, have varying processing power, bandwidth, and media capabilities. Heterogeneous P2P voice systems that ar...
Krishna Kishore Dhara, Salman Baset
106
Voted
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 7 months ago
Exploring the design space of social network-based Sybil defenses
—Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glanc...
Bimal Viswanath, Mainack Mondal, Allen Clement, Pe...
113
Voted
SIGCOMM
2010
ACM
14 years 12 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
138
Voted
INFOCOM
2011
IEEE
14 years 3 months ago
Optimal Sybil-resilient node admission control
—Most existing large-scale networked systems on the Internet such as peer-to-peer systems are vulnerable to Sybil attacks where a single adversary can introduce many bogus identi...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...
98
Voted
P2P
2008
IEEE
184views Communications» more  P2P 2008»
15 years 6 months ago
Ad Hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the ch...
Hasan Guclu, Durgesh Kumari, Murat Yuksel