暂无分享,去创建一个
[1] Aziz Mohaisen,et al. Keep your friends close: Incorporating trust into social network-based Sybil defenses , 2011, 2011 Proceedings IEEE INFOCOM.
[2] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM 2010.
[3] Aziz Mohaisen,et al. Measuring the mixing time of social graphs , 2010, IMC '10.
[4] Brighten Godfrey,et al. Minimizing churn in distributed systems , 2006, SIGCOMM.
[5] Chris Jermaine,et al. The Latent Community Model for Detecting Sybils in Social Networks , 2012, NDSS.
[6] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[7] Ben Y. Zhao,et al. An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[8] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[9] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[10] Prateek Mittal,et al. X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks , 2012, NDSS.
[11] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[12] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[13] Ben Y. Zhao,et al. Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.
[14] Michael J. Freedman,et al. Commensal cuckoo: secure group partitioning for large-scale services , 2012, OPSR.
[15] Michael K. Reiter,et al. Defending against denial-of-service attacks with puzzle auctions , 2003, 2003 Symposium on Security and Privacy, 2003..
[16] Ted Wobber,et al. Moderately hard, memory-bound functions , 2005, TOIT.
[17] Zhuhua Cai,et al. The Latent Community Model for Detecting Sybil Attacks in Social Networks , 2011 .
[18] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[19] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[20] Nikita Borisov,et al. Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).
[21] M. Frans Kaashoek,et al. Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.
[22] Hannes Hartenstein,et al. Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[23] Kevin Borders,et al. Social networks and context-aware spam , 2008, CSCW.
[24] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[25] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[26] Elaine Shi,et al. Portcullis: protecting connection setup from denial-of-capability attacks , 2007, SIGCOMM '07.
[27] Scott Shenker,et al. Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.
[28] Lakshminarayanan Subramanian,et al. Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.
[29] Fengyuan Xu,et al. SybilDefender: Defend against sybil attacks in large social networks , 2012, 2012 Proceedings IEEE INFOCOM.
[30] Ari Juels,et al. $evwu Dfw , 1998 .
[31] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[32] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[33] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[34] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[35] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[36] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2008, TNET.
[37] Mao Yang,et al. An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System , 2005, IPTPS.
[38] Moni Naor,et al. On Memory-Bound Functions for Fighting Spam , 2003, CRYPTO.
[39] Thomas E. Anderson,et al. Phalanx: Withstanding Multimillion-Node Botnets , 2008, NSDI.
[40] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[41] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[42] Thomas F. La Porta,et al. Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[43] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[44] Brent Waters,et al. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs , 2010, NDSS.