-
1
-
-
84947273682
-
The sybil attack
-
J. Douceur, "The sybil attack," in IPTPS, 2002, pp. 251-260.
-
(2002)
IPTPS
, pp. 251-260
-
-
Douceur, J.1
-
2
-
-
44649144215
-
A survey of solutions to the sybil attack
-
B. Levine, C. Shields, and N. Margolin, "A survey of solutions to the sybil attack," University of Massachusetts Amherst, Tech. Rep., 2006.
-
(2006)
University of Massachusetts Amherst, Tech. Rep.
-
-
Levine, B.1
Shields, C.2
Margolin, N.3
-
3
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
M. Castro, P. Druschel, A. J. Ganesh, A. I. T. Rowstron, and D. S. Wallach, "Secure routing for structured peer-to-peer overlay networks," in OSDI, 2002.
-
(2002)
OSDI
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.J.3
Rowstron, A.I.T.4
Wallach, D.S.5
-
4
-
-
33745224219
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. Wattenhofer, "Farsite: Federated, available, and reliable storage for an incompletely trusted environment," in OSDI, 2002.
-
(2002)
OSDI
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.10
-
5
-
-
25844489132
-
Distributed, secure load balancing with skew, heterogeneity and churn
-
J. Ledlie and M. I. Seltzer, "Distributed, secure load balancing with skew, heterogeneity and churn," in INFOCOM, 2005, pp. 1419-1430.
-
(2005)
INFOCOM
, pp. 1419-1430
-
-
Ledlie, J.1
Seltzer, M.I.2
-
6
-
-
73549084755
-
An efficient distributed pki for structured p2p networks
-
IEEE
-
F. Lesueur, L. Mé, and V. V. T. Tong, "An efficient distributed pki for structured p2p networks," in Proceeding of P2P. IEEE, 2009, pp. 1-10.
-
(2009)
Proceeding of P2P
, pp. 1-10
-
-
Lesueur, F.1
Mé, L.2
Tong, V.V.T.3
-
7
-
-
85027289714
-
Computational puzzles as sybil defenses
-
N. Borisov, "Computational puzzles as sybil defenses," in Peer-to-Peer Computing, 2006, pp. 171-176.
-
(2006)
Peer-to-Peer Computing
, pp. 171-176
-
-
Borisov, N.1
-
8
-
-
45749109010
-
Sybilguard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, "Sybilguard: defending against sybil attacks via social networks," IEEE/ACM Trans. Netw., vol. 16, no. 3, pp. 576-589, 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.3
, pp. 576-589
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.D.4
-
9
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, "Sybillimit: A near-optimal social network defense against sybil attacks," in IEEE Symposium on Security and Privacy, 2008, pp. 3-17.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
10
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "Sybilguard: defending against sybil attacks via social networks," in SIGCOMM, 2006, pp. 267-278.
-
(2006)
SIGCOMM
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
11
-
-
78149337076
-
An analysis of social network-based sybil defenses
-
B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove, "An analysis of social network-based sybil defenses," in SIGCOMM, 2010.
-
(2010)
SIGCOMM
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.P.3
Mislove, A.4
-
12
-
-
74049135841
-
Sybilinfer: Detecting sybil nodes using social networks
-
G. Danezis and P. Mittal, "Sybilinfer: Detecting sybil nodes using social networks," in NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
13
-
-
84863903676
-
Whānau: A sybil-proof distributed hash table
-
C. Lesniewski-Lass and M. F. Kaashoek, "Whānau: A sybil-proof distributed hash table," in USENIX NSDI, 2010, pp. 3-17.
-
(2010)
USENIX NSDI
, pp. 3-17
-
-
Lesniewski-Lass, C.1
Kaashoek, M.F.2
-
14
-
-
78650907130
-
Measuring the mixing time of social graphs
-
ACM
-
A. Mohaisen, A. Yun, and Y. Kim, "Measuring the mixing time of social graphs," in IMC. ACM, 2010, pp. 383-389.
-
(2010)
IMC
, pp. 383-389
-
-
Mohaisen, A.1
Yun, A.2
Kim, Y.3
-
15
-
-
84887052468
-
Sybil-resilient online content voting
-
USENIX Association
-
N. Tran, B. Min, J. Li, and L. Subramanian, "Sybil-resilient online content voting," in NSDI. USENIX Association, 2009, pp. 15-28.
-
(2009)
NSDI
, pp. 15-28
-
-
Tran, N.1
Min, B.2
Li, J.3
Subramanian, L.4
-
16
-
-
37849017498
-
Social network analysis for routing in disconnected delay-tolerant manets
-
New York, NY, USA: ACM
-
E. M. Daly and M. Haahr, "Social network analysis for routing in disconnected delay-tolerant manets," in MobiHoc '07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. New York, NY, USA: ACM, 2007, pp. 32-40.
-
(2007)
MobiHoc '07: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 32-40
-
-
Daly, E.M.1
Haahr, M.2
-
17
-
-
23944441724
-
Dht routing using social links
-
S. Marti, P. Ganesan, and H. Garcia-Molina, "Dht routing using social links," in IPTPS, 2004, pp. 100-111.
-
(2004)
IPTPS
, pp. 100-111
-
-
Marti, S.1
Ganesan, P.2
Garcia-Molina, H.3
-
18
-
-
35248858802
-
Using social network theory towards development of wireless ad hoc network trust
-
S. Pai, T. Roosta, S. B. Wicker, and S. Sastry, "Using social network theory towards development of wireless ad hoc network trust," in AINA Workshops, 2007, pp. 443-450.
-
(2007)
AINA Workshops
, pp. 443-450
-
-
Pai, S.1
Roosta, T.2
Wicker, S.B.3
Sastry, S.4
-
19
-
-
70349673250
-
A sybilproof indirect reciprocity mechanism for peer-to-peer networks
-
R. Landa, D. Griffin, R. Clegg, E. Mykoniati, and M. Rio, "A sybilproof indirect reciprocity mechanism for peer-to-peer networks," in Proceedings of IEEE Infocom, vol. 9, 2009.
-
(2009)
Proceedings of IEEE Infocom
, vol.9
-
-
Landa, R.1
Griffin, D.2
Clegg, R.3
Mykoniati, E.4
Rio, M.5
-
20
-
-
84995477295
-
On the evolution of user interaction in facebook
-
August
-
B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi, "On the evolution of user interaction in facebook," in Proceedings of the 2nd ACM SIGCOMM Workshop on Social Networks, August 2009.
-
(2009)
Proceedings of the 2nd ACM SIGCOMM Workshop on Social Networks
-
-
Viswanath, B.1
Mislove, A.2
Cha, M.3
Gummadi, K.P.4
-
21
-
-
70349153347
-
User interactions in social networks and their implications
-
ACM
-
C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao, "User interactions in social networks and their implications," in EuroSys. ACM, 2009, pp. 205-218.
-
(2009)
EuroSys.
, pp. 205-218
-
-
Wilson, C.1
Boe, B.2
Sala, A.3
Puttaswamy, K.P.4
Zhao, B.Y.5
-
22
-
-
77954580498
-
Predicting positive and negative links in online social networks
-
J. Leskovec, D. P. Huttenlocher, and J. M. Kleinberg, "Predicting positive and negative links in online social networks," in WWW, 2010, pp. 641-650.
-
(2010)
WWW
, pp. 641-650
-
-
Leskovec, J.1
Huttenlocher, D.P.2
Kleinberg, J.M.3
-
23
-
-
65449185511
-
Feedback effects between similarity and social influence in online communities
-
D. J. Crandall, D. Cosley, D. P. Huttenlocher, J. M. Kleinberg, and S. Suri, "Feedback effects between similarity and social influence in online communities," in KDD, 2008, pp. 160-168.
-
(2008)
KDD
, pp. 160-168
-
-
Crandall, D.J.1
Cosley, D.2
Huttenlocher, D.P.3
Kleinberg, J.M.4
Suri, S.5
-
24
-
-
70450206762
-
Centralities: Capturing the fuzzy notion of importance in social graphs
-
ACM
-
E. Le Merrer and G. Trédan, "Centralities: capturing the fuzzy notion of importance in social graphs," in SNS. ACM, 2009, pp. 33-38.
-
(2009)
SNS
, pp. 33-38
-
-
Le Merrer, E.1
Trédan, G.2
-
25
-
-
18744398132
-
The link prediction problem for social networks
-
ACM
-
D. Liben-Nowell and J. M. Kleinberg, "The link prediction problem for social networks," in CIKM. ACM, 2003, pp. 556-559.
-
(2003)
CIKM
, pp. 556-559
-
-
Liben-Nowell, D.1
Kleinberg, J.M.2
-
26
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, P. K. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and analysis of online social networks," in Internet Measurement Comference, 2007, pp. 29-42.
-
(2007)
Internet Measurement Comference
, pp. 29-42
-
-
Mislove, A.1
Marcon, M.2
Gummadi, P.K.3
Druschel, P.4
Bhattacharjee, B.5
-
27
-
-
35348871999
-
Analysis of topological characteristics of huge online social networking services
-
Y.-Y. Ahn, S. Han, H. Kwak, S. B. Moon, and H. Jeong, "Analysis of topological characteristics of huge online social networking services," in WWW, 2007, pp. 835-844.
-
(2007)
WWW
, pp. 835-844
-
-
Ahn, Y.-Y.1
Han, S.2
Kwak, H.3
Moon, S.B.4
Jeong, H.5
-
28
-
-
85009714348
-
Trust and nuanced profile similarity in online social networks
-
J. Golbeck, "Trust and nuanced profile similarity in online social networks," ACM Trans. Web, vol. 3, no. 4, pp. 1-33, 2009.
-
(2009)
ACM Trans. Web
, vol.3
, Issue.4
, pp. 1-33
-
-
Golbeck, J.1
-
29
-
-
84870159064
-
Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace
-
C. Dwyer, S. Hiltz, and K. Passerini, "Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace," in AMCIS, 2007.
-
(2007)
AMCIS
-
-
Dwyer, C.1
Hiltz, S.2
Passerini, K.3
-
30
-
-
38149019135
-
Anonymity in the wild: Mixes on unstructured networks
-
S. Nagaraja, "Anonymity in the wild: Mixes on unstructured networks," in Privacy Enhancing Technologies, 2007, pp. 254-271.
-
(2007)
Privacy Enhancing Technologies
, pp. 254-271
-
-
Nagaraja, S.1
-
31
-
-
79960871548
-
Incorporating trust into social network-based sybil defenses
-
A. Mohaisen, N. Hopper, and Y. Kim, "Incorporating trust into social network-based sybil defenses," UMN, Tech. Rep., 2010.
-
(2010)
UMN, Tech. Rep.
-
-
Mohaisen, A.1
Hopper, N.2
Kim, Y.3
-
32
-
-
84971804758
-
Improved bounds for mixing rates of marcov chains and multicommodity flow
-
A. Sinclair, "Improved bounds for mixing rates of marcov chains and multicommodity flow," Comb., Probability & Computing, vol. 1, pp. 351-370, 1992.
-
(1992)
Comb., Probability & Computing
, vol.1
, pp. 351-370
-
-
Sinclair, A.1
-
33
-
-
32344436210
-
Graphs over time: Densification laws, shrinking diameters and possible explanations
-
ACM
-
J. Leskovec, J. Kleinberg, and C. Faloutsos, "Graphs over time: densification laws, shrinking diameters and possible explanations," in KDD. ACM, 2005, pp. 177-187.
-
(2005)
KDD
, pp. 177-187
-
-
Leskovec, J.1
Kleinberg, J.2
Faloutsos, C.3
-
34
-
-
70350647041
-
Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters
-
vol. abs/0810.1355
-
J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney, "Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters," CoRR, vol. abs/0810.1355, 2008.
-
(2008)
CoRR
-
-
Leskovec, J.1
Lang, K.J.2
Dasgupta, A.3
Mahoney, M.W.4
-
35
-
-
0242308058
-
Trust management for the semantic web
-
M. Richardson, R. Agrawal, and P. Domingos, "Trust management for the semantic web," in ISWC, 2003, pp. 351-368.
-
(2003)
ISWC
, pp. 351-368
-
-
Richardson, M.1
Agrawal, R.2
Domingos, P.3
-
36
-
-
4944256645
-
The DBLP computer science bibliography: Evolution, research issues, perspectives
-
Springer
-
M. Ley, "The DBLP computer science bibliography: Evolution, research issues, perspectives," in String Processing and Information Retrieval. Springer, 2009, pp. 481-486.
-
(2009)
String Processing and Information Retrieval
, pp. 481-486
-
-
Ley, M.1
-
37
-
-
77950886667
-
You are who you know: Inferring user profiles in Online Social Networks
-
New York, NY, February
-
A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel, "You are who you know: Inferring user profiles in Online Social Networks," in WSDM, New York, NY, February 2010.
-
(2010)
WSDM
-
-
Mislove, A.1
Viswanath, B.2
Gummadi, K.P.3
Druschel, P.4
|