Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
暂无分享,去创建一个
Song Guo | Guojun Wang | Muhammad Bashir Abdullahi | Felix Musau | Song Guo | Guojun Wang | F. Musau | M. Abdullahi
[1] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[2] Lakshminarayanan Subramanian,et al. Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Ling Xu,et al. Resisting Sybil Attack By Social Network and Network Clustering , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.
[4] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[5] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[6] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[7] Dharanipragada Janakiram,et al. SyMon: A practical approach to defend large structured P2P systems against Sybil Attack , 2011 .
[8] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[9] Emin Gün Sirer,et al. Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.
[10] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[11] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[12] V. Dheepa,et al. Group Formation with Neighbour Similarity Trust in P 2 P E-Commerce , 2015 .
[13] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[14] Jongpil Yoon,et al. Trust management with delegation in grouped peer-to-peer communities , 2006, SACMAT '06.
[15] Feng Xiao,et al. DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[16] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[17] Geng Yang,et al. Sybil Attack Detection Based on RSSI for Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[18] Aziz Mohaisen,et al. Keep your friends close: Incorporating trust into social network-based Sybil defenses , 2011, 2011 Proceedings IEEE INFOCOM.
[19] E. Ravichandra Reddy,et al. A Reputation Based Approach For Choosing Reliable Resources In Peer To Peer Networks , 2013 .
[20] Paul Francis,et al. IDMaps: a global internet host distance estimation service , 2001, TNET.
[21] A. Tversky. Features of Similarity , 1977 .
[22] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[23] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[24] Guojun Wang,et al. Group formation with neighbor similarity trust in P2P E-commerce , 2011, Peer-to-Peer Networking and Applications.
[25] Kun Wang,et al. Secure Trust-based Cooperative Communications in Wireless Multi-Hop Networks , 2010 .
[26] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[27] Krishna P. Gummadi,et al. Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.
[28] Fengyuan Xu,et al. SybilDefender: Defend against sybil attacks in large social networks , 2012, 2012 Proceedings IEEE INFOCOM.
[29] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM.
[30] Bo Yu,et al. Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..
[31] Jizhong Zhao,et al. Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.