-
1
-
-
4544304744
-
The sybil attack
-
J. Douceur, "The Sybil Attack," in IPTPS, 2002.
-
(2002)
IPTPS
-
-
Douceur, J.1
-
2
-
-
84887052468
-
Sybil-resilient online content voting
-
N. Tran, B. Min, J. Li, and L. Subramanian, "Sybil-Resilient Online Content Voting," in NSDI, 2009.
-
(2009)
NSDI
-
-
Tran, N.1
Min, B.2
Li, J.3
Subramanian, L.4
-
3
-
-
35548992569
-
SybilGuard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks," in SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
4
-
-
70449694823
-
SybilLimit: A near-optimal social network defense against sybil attacks
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks," in IEEE S&P, 2008.
-
(2008)
IEEE S&P
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
5
-
-
85180633166
-
SybilInfer: Detecting sybil nodes using social networks
-
G. Danezis and P. Mittal, "SybilInfer: Detecting Sybil Nodes using Social Networks," in NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
6
-
-
79960849345
-
Optimal sybil-resilient node admission control
-
N. Tran, J. Li, L. Subramanian, and S. S. Chow, "Optimal sybil-resilient node admission control," in INFOCOM, 2011.
-
(2011)
INFOCOM
-
-
Tran, N.1
Li, J.2
Subramanian, L.3
Chow, S.S.4
-
7
-
-
77953317298
-
Sybil attacks against mobile users: Friends and foes to the rescue
-
D. Quercia and S. Hailes, "Sybil attacks against mobile users: Friends and foes to the rescue," in INFOCOM, 2010.
-
(2010)
INFOCOM
-
-
Quercia, D.1
Hailes, S.2
-
8
-
-
85076766975
-
Whānau: A sybil-proof distributed hash table
-
C. Lesniewski-Laas and M. F. Kaashoek, "Whanau: A Sybil-proof Distributed Hash Table," in NSDI, 2010.
-
(2010)
NSDI
-
-
Lesniewski-Laas, C.1
Kaashoek, M.F.2
-
9
-
-
84880521520
-
Bazaar: Strengthening user reputations in online marketplaces
-
A. Post, V. Shah, and A. Mislove, "Bazaar: Strengthening user reputations in online marketplaces," in NSDI, 2011.
-
(2011)
NSDI
-
-
Post, A.1
Shah, V.2
Mislove, A.3
-
10
-
-
80054703857
-
Ostra: Leveraging trust to thwart unwanted communication
-
A. Mislove, A. Post, K. P. Gummadi, and P. Druschel, "Ostra: Leveraging Trust to Thwart Unwanted Communication," in NSDI, 2008.
-
(2008)
NSDI
-
-
Mislove, A.1
Post, A.2
Gummadi, K.P.3
Druschel, P.4
-
11
-
-
33749067224
-
TrustDavis: A non-exploitable online reputation system
-
D. do B. DeFigueiredo and E. T. Barr, "TrustDavis: A non-exploitable online reputation system," IEEE E-Commerce, 2005.
-
(2005)
IEEE E-Commerce
-
-
Defigueiredo Do, D.B.1
Barr, E.T.2
-
12
-
-
84858064917
-
Sybil defenses via social networks: A tutorial and survey
-
H. Yu, "Sybil defenses via social networks: a tutorial and survey," SIGACT News, vol. 42, no. 3, 2011.
-
(2011)
SIGACT News
, vol.42
, Issue.3
-
-
Yu, H.1
-
13
-
-
78149337076
-
An analysis of social network-based sybil defenses
-
B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove, "An Analysis of Social Network-based Sybil Defenses," in SIGCOMM, 2010.
-
(2010)
SIGCOMM
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.P.3
Mislove, A.4
-
15
-
-
84894714314
-
-
"Diaspora*," http://joindiaspora.com.
-
Diaspora*
-
-
-
16
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and Analysis of Online Social Networks," in IMC, 2007.
-
(2007)
IMC
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
17
-
-
35348871999
-
Analysis of topological characteristics of huge online social networking services
-
Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, "Analysis of Topological Characteristics of Huge Online Social Networking Services," in WWW, 2007.
-
(2007)
WWW
-
-
Ahn, Y.-Y.1
Han, S.2
Kwak, H.3
Moon, S.4
Jeong, H.5
-
18
-
-
77954653623
-
Empirical comparison of algorithms for network community detection
-
J. Leskovec, K. Lang, and M. Mahoney, "Empirical comparison of algorithms for network community detection," in WWW, 2010.
-
(2010)
WWW
-
-
Leskovec, J.1
Lang, K.2
Mahoney, M.3
-
19
-
-
78650907130
-
Measuring the mixing time of social graphs
-
A. Mohaisen, A. Yun, and Y. Kim, "Measuring the mixing time of social graphs," in IMC, 2010.
-
(2010)
IMC
-
-
Mohaisen, A.1
Yun, A.2
Kim, Y.3
-
20
-
-
0035895239
-
The structure of scientific collaboration networks
-
DOI 10.1073/pnas.021544898
-
M. E. J. Newman, "The structure of scientific collaboration networks," PNAS, vol. 98, no. 2, pp. 404-409, 2001. (Pubitemid 32105053)
-
(2001)
Proceedings of the National Academy of Sciences of the United States of America
, vol.98
, Issue.2
, pp. 404-409
-
-
Newman, M.E.J.1
-
22
-
-
84858017430
-
Limiting large-scale crawls of social networking sites
-
Nov.
-
M. Mondal, B. Viswanath, A. Clement, P. Druschel, K. P. Gummadi, A. Mislove, and A. Post, "Limiting large-scale crawls of social networking sites," MPI-SWS, Tech. Rep. 2011-006, Nov. 2011.
-
(2011)
MPI-SWS, Tech. Rep. 2011-006
-
-
Mondal, M.1
Viswanath, B.2
Clement, A.3
Druschel, P.4
Gummadi, K.P.5
Mislove, A.6
Post, A.7
-
23
-
-
77953295319
-
P2p trading in social networks: The value of staying connected
-
Z. Liu, H. Hu, Y. Liu, K. W. Ross, Y. Wang, and M. Mobius, "P2p trading in social networks: The value of staying connected," in INFOCOMM, 2010.
-
(2010)
INFOCOMM
-
-
Liu, Z.1
Hu, H.2
Liu, Y.3
Ross, K.W.4
Wang, Y.5
Mobius, M.6
-
24
-
-
78650651711
-
Liquidity in credit networks: A little trust goes a long way
-
P. Dandekar, A. Goel, R. Govindan, and I. Post, "Liquidity in credit networks: A little trust goes a long way," in NetEcon, 2010.
-
(2010)
NetEcon
-
-
Dandekar, P.1
Goel, A.2
Govindan, R.3
Post, I.4
-
25
-
-
84858066430
-
Mechanism design on trust networks
-
A. Ghosh, M. Mahdian, D. Reeves, D. Pennock, and R. Fugger, "Mechanism design on trust networks," in NetEcon, 2007.
-
(2007)
NetEcon
-
-
Ghosh, A.1
Mahdian, M.2
Reeves, D.3
Pennock, D.4
Fugger, R.5
-
26
-
-
35348871999
-
Analysis of topological characteristics of huge online social networking services
-
Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, "Analysis of topological characteristics of huge online social networking services," in WWW, 2007.
-
(2007)
WWW
-
-
Ahn, Y.-Y.1
Han, S.2
Kwak, H.3
Moon, S.4
Jeong, H.5
-
27
-
-
84858058371
-
On the Sybil-Proofness of accounting mechanisms
-
S. Seuken and D. C. Parkes, "On the Sybil-Proofness of accounting mechanisms," in NetEcon, 2011.
-
(2011)
NetEcon
-
-
Seuken, S.1
Parkes, D.C.2
-
29
-
-
0002471366
-
A new approach to the maximum flow problem
-
Berkeley, CA
-
A. V. Goldberg and R. E. Tarjan, "A new approach to the maximum flow problem," in STOC'86, Berkeley, CA, 1986.
-
(1986)
STOC'86
-
-
Goldberg, A.V.1
Tarjan, R.E.2
-
30
-
-
0000891810
-
An algorithm for the solution of the max-flow problem with the polynomial estimation
-
E. A. Dinic, "An algorithm for the solution of the max-flow problem with the polynomial estimation," Doklady Akademii Nauk SSSR, vol. 194, no. 4, 1970.
-
(1970)
Doklady Akademii Nauk SSSR
, vol.194
, Issue.4
-
-
Dinic, E.A.1
-
31
-
-
0000748672
-
Multi-terminal network flows
-
R. E. Gomory and T. Hu, "Multi-terminal network flows," SIAM, vol. 9, no. 4, pp. 551-570, 1961.
-
(1961)
SIAM
, vol.9
, Issue.4
, pp. 551-570
-
-
Gomory, R.E.1
Hu, T.2
-
33
-
-
78651275635
-
Fast and accurate estimation of shortest paths in large graphs
-
A. Gubichev, S. Bedathur, S. Seufert, and G.Weikum, "Fast and accurate estimation of shortest paths in large graphs," in CIKM, 2010.
-
(2010)
CIKM
-
-
Gubichev, A.1
Bedathur, S.2
Seufert, S.3
Weikum, G.4
-
34
-
-
77950874002
-
A sketchbased distance oracle for web-scale graphs
-
A. Das Sarma, S. Gollapudi, M. Najork, and R. Panigrahy, "A sketchbased distance oracle for web-scale graphs," in WSDM, 2010.
-
(2010)
WSDM
-
-
Das Sarma, A.1
Gollapudi, S.2
Najork, M.3
Panigrahy, R.4
|