메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1943-1951

Keep your friends close: Incorporating trust into social network-based Sybil defenses

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMIC PROPERTIES; COMMUNITY STRUCTURES; NETWORK-BASED; ONLINE SOCIAL NETWORKS; RANDOM WALK; SOCIAL GRAPHS; TRUST VALUES;

EID: 79960871268     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5934998     Document Type: Conference Paper
Times cited : (107)

References (37)
  • 1
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • J. Douceur, "The sybil attack," in IPTPS, 2002, pp. 251-260.
    • (2002) IPTPS , pp. 251-260
    • Douceur, J.1
  • 5
    • 25844489132 scopus 로고    scopus 로고
    • Distributed, secure load balancing with skew, heterogeneity and churn
    • J. Ledlie and M. I. Seltzer, "Distributed, secure load balancing with skew, heterogeneity and churn," in INFOCOM, 2005, pp. 1419-1430.
    • (2005) INFOCOM , pp. 1419-1430
    • Ledlie, J.1    Seltzer, M.I.2
  • 6
    • 73549084755 scopus 로고    scopus 로고
    • An efficient distributed pki for structured p2p networks
    • IEEE
    • F. Lesueur, L. Mé, and V. V. T. Tong, "An efficient distributed pki for structured p2p networks," in Proceeding of P2P. IEEE, 2009, pp. 1-10.
    • (2009) Proceeding of P2P , pp. 1-10
    • Lesueur, F.1    Mé, L.2    Tong, V.V.T.3
  • 7
    • 85027289714 scopus 로고    scopus 로고
    • Computational puzzles as sybil defenses
    • N. Borisov, "Computational puzzles as sybil defenses," in Peer-to-Peer Computing, 2006, pp. 171-176.
    • (2006) Peer-to-Peer Computing , pp. 171-176
    • Borisov, N.1
  • 8
    • 45749109010 scopus 로고    scopus 로고
    • Sybilguard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, "Sybilguard: defending against sybil attacks via social networks," IEEE/ACM Trans. Netw., vol. 16, no. 3, pp. 576-589, 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.D.4
  • 10
    • 33750285481 scopus 로고    scopus 로고
    • Sybilguard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "Sybilguard: defending against sybil attacks via social networks," in SIGCOMM, 2006, pp. 267-278.
    • (2006) SIGCOMM , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 12
    • 74049135841 scopus 로고    scopus 로고
    • Sybilinfer: Detecting sybil nodes using social networks
    • G. Danezis and P. Mittal, "Sybilinfer: Detecting sybil nodes using social networks," in NDSS, 2009.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 13
    • 84863903676 scopus 로고    scopus 로고
    • Whānau: A sybil-proof distributed hash table
    • C. Lesniewski-Lass and M. F. Kaashoek, "Whānau: A sybil-proof distributed hash table," in USENIX NSDI, 2010, pp. 3-17.
    • (2010) USENIX NSDI , pp. 3-17
    • Lesniewski-Lass, C.1    Kaashoek, M.F.2
  • 14
    • 78650907130 scopus 로고    scopus 로고
    • Measuring the mixing time of social graphs
    • ACM
    • A. Mohaisen, A. Yun, and Y. Kim, "Measuring the mixing time of social graphs," in IMC. ACM, 2010, pp. 383-389.
    • (2010) IMC , pp. 383-389
    • Mohaisen, A.1    Yun, A.2    Kim, Y.3
  • 15
    • 84887052468 scopus 로고    scopus 로고
    • Sybil-resilient online content voting
    • USENIX Association
    • N. Tran, B. Min, J. Li, and L. Subramanian, "Sybil-resilient online content voting," in NSDI. USENIX Association, 2009, pp. 15-28.
    • (2009) NSDI , pp. 15-28
    • Tran, N.1    Min, B.2    Li, J.3    Subramanian, L.4
  • 17
    • 23944441724 scopus 로고    scopus 로고
    • Dht routing using social links
    • S. Marti, P. Ganesan, and H. Garcia-Molina, "Dht routing using social links," in IPTPS, 2004, pp. 100-111.
    • (2004) IPTPS , pp. 100-111
    • Marti, S.1    Ganesan, P.2    Garcia-Molina, H.3
  • 18
    • 35248858802 scopus 로고    scopus 로고
    • Using social network theory towards development of wireless ad hoc network trust
    • S. Pai, T. Roosta, S. B. Wicker, and S. Sastry, "Using social network theory towards development of wireless ad hoc network trust," in AINA Workshops, 2007, pp. 443-450.
    • (2007) AINA Workshops , pp. 443-450
    • Pai, S.1    Roosta, T.2    Wicker, S.B.3    Sastry, S.4
  • 21
    • 70349153347 scopus 로고    scopus 로고
    • User interactions in social networks and their implications
    • ACM
    • C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao, "User interactions in social networks and their implications," in EuroSys. ACM, 2009, pp. 205-218.
    • (2009) EuroSys. , pp. 205-218
    • Wilson, C.1    Boe, B.2    Sala, A.3    Puttaswamy, K.P.4    Zhao, B.Y.5
  • 22
    • 77954580498 scopus 로고    scopus 로고
    • Predicting positive and negative links in online social networks
    • J. Leskovec, D. P. Huttenlocher, and J. M. Kleinberg, "Predicting positive and negative links in online social networks," in WWW, 2010, pp. 641-650.
    • (2010) WWW , pp. 641-650
    • Leskovec, J.1    Huttenlocher, D.P.2    Kleinberg, J.M.3
  • 23
    • 65449185511 scopus 로고    scopus 로고
    • Feedback effects between similarity and social influence in online communities
    • D. J. Crandall, D. Cosley, D. P. Huttenlocher, J. M. Kleinberg, and S. Suri, "Feedback effects between similarity and social influence in online communities," in KDD, 2008, pp. 160-168.
    • (2008) KDD , pp. 160-168
    • Crandall, D.J.1    Cosley, D.2    Huttenlocher, D.P.3    Kleinberg, J.M.4    Suri, S.5
  • 24
    • 70450206762 scopus 로고    scopus 로고
    • Centralities: Capturing the fuzzy notion of importance in social graphs
    • ACM
    • E. Le Merrer and G. Trédan, "Centralities: capturing the fuzzy notion of importance in social graphs," in SNS. ACM, 2009, pp. 33-38.
    • (2009) SNS , pp. 33-38
    • Le Merrer, E.1    Trédan, G.2
  • 25
    • 18744398132 scopus 로고    scopus 로고
    • The link prediction problem for social networks
    • ACM
    • D. Liben-Nowell and J. M. Kleinberg, "The link prediction problem for social networks," in CIKM. ACM, 2003, pp. 556-559.
    • (2003) CIKM , pp. 556-559
    • Liben-Nowell, D.1    Kleinberg, J.M.2
  • 27
    • 35348871999 scopus 로고    scopus 로고
    • Analysis of topological characteristics of huge online social networking services
    • Y.-Y. Ahn, S. Han, H. Kwak, S. B. Moon, and H. Jeong, "Analysis of topological characteristics of huge online social networking services," in WWW, 2007, pp. 835-844.
    • (2007) WWW , pp. 835-844
    • Ahn, Y.-Y.1    Han, S.2    Kwak, H.3    Moon, S.B.4    Jeong, H.5
  • 28
    • 85009714348 scopus 로고    scopus 로고
    • Trust and nuanced profile similarity in online social networks
    • J. Golbeck, "Trust and nuanced profile similarity in online social networks," ACM Trans. Web, vol. 3, no. 4, pp. 1-33, 2009.
    • (2009) ACM Trans. Web , vol.3 , Issue.4 , pp. 1-33
    • Golbeck, J.1
  • 29
    • 84870159064 scopus 로고    scopus 로고
    • Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace
    • C. Dwyer, S. Hiltz, and K. Passerini, "Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace," in AMCIS, 2007.
    • (2007) AMCIS
    • Dwyer, C.1    Hiltz, S.2    Passerini, K.3
  • 30
    • 38149019135 scopus 로고    scopus 로고
    • Anonymity in the wild: Mixes on unstructured networks
    • S. Nagaraja, "Anonymity in the wild: Mixes on unstructured networks," in Privacy Enhancing Technologies, 2007, pp. 254-271.
    • (2007) Privacy Enhancing Technologies , pp. 254-271
    • Nagaraja, S.1
  • 31
    • 79960871548 scopus 로고    scopus 로고
    • Incorporating trust into social network-based sybil defenses
    • A. Mohaisen, N. Hopper, and Y. Kim, "Incorporating trust into social network-based sybil defenses," UMN, Tech. Rep., 2010.
    • (2010) UMN, Tech. Rep.
    • Mohaisen, A.1    Hopper, N.2    Kim, Y.3
  • 32
    • 84971804758 scopus 로고
    • Improved bounds for mixing rates of marcov chains and multicommodity flow
    • A. Sinclair, "Improved bounds for mixing rates of marcov chains and multicommodity flow," Comb., Probability & Computing, vol. 1, pp. 351-370, 1992.
    • (1992) Comb., Probability & Computing , vol.1 , pp. 351-370
    • Sinclair, A.1
  • 33
    • 32344436210 scopus 로고    scopus 로고
    • Graphs over time: Densification laws, shrinking diameters and possible explanations
    • ACM
    • J. Leskovec, J. Kleinberg, and C. Faloutsos, "Graphs over time: densification laws, shrinking diameters and possible explanations," in KDD. ACM, 2005, pp. 177-187.
    • (2005) KDD , pp. 177-187
    • Leskovec, J.1    Kleinberg, J.2    Faloutsos, C.3
  • 34
    • 70350647041 scopus 로고    scopus 로고
    • Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters
    • vol. abs/0810.1355
    • J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney, "Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters," CoRR, vol. abs/0810.1355, 2008.
    • (2008) CoRR
    • Leskovec, J.1    Lang, K.J.2    Dasgupta, A.3    Mahoney, M.W.4
  • 35
    • 0242308058 scopus 로고    scopus 로고
    • Trust management for the semantic web
    • M. Richardson, R. Agrawal, and P. Domingos, "Trust management for the semantic web," in ISWC, 2003, pp. 351-368.
    • (2003) ISWC , pp. 351-368
    • Richardson, M.1    Agrawal, R.2    Domingos, P.3
  • 36
    • 4944256645 scopus 로고    scopus 로고
    • The DBLP computer science bibliography: Evolution, research issues, perspectives
    • Springer
    • M. Ley, "The DBLP computer science bibliography: Evolution, research issues, perspectives," in String Processing and Information Retrieval. Springer, 2009, pp. 481-486.
    • (2009) String Processing and Information Retrieval , pp. 481-486
    • Ley, M.1
  • 37
    • 77950886667 scopus 로고    scopus 로고
    • You are who you know: Inferring user profiles in Online Social Networks
    • New York, NY, February
    • A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel, "You are who you know: Inferring user profiles in Online Social Networks," in WSDM, New York, NY, February 2010.
    • (2010) WSDM
    • Mislove, A.1    Viswanath, B.2    Gummadi, K.P.3    Druschel, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.