Keep your friends close: Incorporating trust into social network-based Sybil defenses
暂无分享,去创建一个
Aziz Mohaisen | Nicholas Hopper | Yongdae Kim | Yongdae Kim | N. Hopper | Aziz Mohaisen | Nicholas Hopper
[1] Alistair Sinclair,et al. Improved Bounds for Mixing Rates of Markov Chains and Multicommodity Flow , 1992, Combinatorics, Probability and Computing.
[2] Bart Selman,et al. Referral Web: combining social networks and collaborative filtering , 1997, CACM.
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] Michael Ley,et al. The DBLP Computer Science Bibliography: Evolution, Research Issues, Perspectives , 2002, SPIRE.
[5] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[6] Jacob R. Lorch,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OSDI '02.
[7] Matthew Richardson,et al. Trust Management for the Semantic Web , 2003, SEMWEB.
[8] Hector Garcia-Molina,et al. DHT Routing Using Social Links , 2004, IPTPS.
[9] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[10] Christos Faloutsos,et al. Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.
[11] Margo I. Seltzer,et al. Distributed, secure load balancing with skew, heterogeneity and churn , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[12] Nikita Borisov,et al. Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).
[13] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[14] Starr Roxanne Hiltz,et al. Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.
[15] Jiye Yu,et al. iLink: search and routing in social networks , 2007, KDD '07.
[16] Krishna P. Gummadi,et al. Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.
[17] Stephen B. Wicker,et al. Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[18] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[19] David Liben-Nowell,et al. The link-prediction problem for social networks , 2007 .
[20] Shishir Nagaraja,et al. Anonymity in the Wild: Mixes on Unstructured Networks , 2007, Privacy Enhancing Technologies.
[21] Seungyeop Han,et al. Analysis of topological characteristics of huge online social networking services , 2007, WWW '07.
[22] Mads Haahr,et al. Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.
[23] John Kelley,et al. WhozThat? evolving an ecosystem for context-aware mobile social networks , 2008, IEEE Network.
[24] Shouhuai Xu,et al. Exploiting social networks for threshold signing: attack-resilience vs. availability , 2008, ASIACCS '08.
[25] Russell J. Clark,et al. D-book: a mobile social networking application for delay tolerant networks , 2008, CHANTS '08.
[26] Jon M. Kleinberg,et al. Feedback effects between similarity and social influence in online communities , 2008, KDD.
[27] Greg Bigwood,et al. Social DTN routing , 2008, CoNEXT '08.
[28] Phillip B. Gibbons,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2006, IEEE/ACM Transactions on Networking.
[29] Valérie Viet Triem Tong,et al. A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification , 2008, 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[30] Mads Haahr,et al. Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.
[31] Nicholas Hopper,et al. Membership-concealing overlay networks , 2009, CCS.
[32] Feng Xiao,et al. DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[33] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[34] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[35] Sencun Zhu,et al. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.
[36] Miguel Rio,et al. A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks , 2009, IEEE INFOCOM 2009.
[37] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[38] Jennifer Golbeck,et al. Trust and nuanced profile similarity in online social networks , 2009, TWEB.
[39] Erwan Le Merrer,et al. Centralities: capturing the fuzzy notion of importance in social graphs , 2009, SNS '09.
[40] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[41] Valérie Viet Triem Tong,et al. An efficient distributed PKI for structured P2P networks , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[42] Jure Leskovec,et al. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..
[43] Jure Leskovec,et al. Predicting positive and negative links in online social networks , 2010, WWW '10.
[44] Qinghua Li,et al. Routing in Socially Selfish Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[45] Nicholas Hopper,et al. Towards freedom of speech on the internet: censorship-resistant communication and storage , 2010 .
[46] Lakshminarayanan Subramanian,et al. Brief announcement: improving social-network-based sybil-resilient node admission control , 2010, PODC '10.
[47] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM 2010.
[48] Krishna P. Gummadi,et al. You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.
[49] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..
[50] Aziz Mohaisen,et al. Measuring the mixing time of social graphs , 2010, IMC '10.
[51] M. Frans Kaashoek,et al. Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.
[52] Daniele Quercia,et al. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue , 2010, 2010 Proceedings IEEE INFOCOM.
[53] Chandra Prakash,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2011 .