Design and evaluation of persea, a sybil-resistant DHT
暂无分享,去创建一个
[1] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[2] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[3] Keith W. Ross,et al. The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[4] Silvio Lattanzi,et al. SoK: The Evolution of Sybil Defense via Social Networks , 2013, 2013 IEEE Symposium on Security and Privacy.
[5] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[6] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[7] Aziz Mohaisen,et al. Measuring the mixing time of social graphs , 2010, IMC '10.
[8] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[9] David Mazières,et al. Separating key management from file system security , 1999, SOSP.
[10] M. Frans Kaashoek,et al. Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.
[11] Konstantin Beznosov,et al. Design and analysis of a social botnet , 2013, Comput. Networks.
[12] K. Hwang,et al. Prevention of Index-Poisoning DDoS Attacks in Peer-to-Peer File-Sharing Networks , 2006 .
[13] Miguel Castro,et al. Defending against eclipse attacks on overlay networks , 2004, EW 11.
[14] Prateek Mittal,et al. X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks , 2012, NDSS.
[15] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[16] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[17] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[18] Chris Lesniewski-Laas,et al. A Sybil-proof one-hop DHT , 2008, SocialNets '08.
[19] Taoufik En-Najjary,et al. Exploiting KAD: possible uses and misuses , 2007, CCRV.
[20] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[21] Krishna P. Gummadi,et al. Exploring the design space of social network-based Sybil defenses , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[22] Ben Y. Zhao,et al. An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[23] Brent Waters,et al. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs , 2010, NDSS.
[24] Fengyuan Xu,et al. SybilDefender: Defend against sybil attacks in large social networks , 2012, 2012 Proceedings IEEE INFOCOM.
[25] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[26] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[27] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[28] Olivier Festor,et al. Evaluation of Sybil Attacks Protection Schemes in KAD , 2009, AIMS.
[29] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[30] Nick Feamster,et al. Accountable internet protocol (aip) , 2008, SIGCOMM '08.
[31] Lakshminarayanan Subramanian,et al. Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.
[32] Calton Pu,et al. Reverse Social Engineering Attacks in Online Social Networks , 2011, DIMVA.
[33] Mao Yang,et al. An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System , 2005, IPTPS.
[34] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[35] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[36] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[37] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.