You are here

Bibliography

Export 8 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is Sybil attack  [Clear All Filters]
2013
Al-Ameen MN, Wright M. Persea: A Sybil-resistant Social DHT. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. Proceedings of the Third ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM; 2013. Available from: http://doi.acm.org.eaccess.ub.tum.de/10.1145/2435349.2435372
2010
Cholez T, Chrisment I, Festor O. Efficient DHT attack mitigation through peers’ ID distribution . In: HOTP2P'10 - International Workshop on Hot Topics in Peer-to-Peer Systems. HOTP2P'10 - International Workshop on Hot Topics in Peer-to-Peer Systems. Atlanta, Georgia, USA; 2010.
2009
Cholez T, Chrisment I, Festor O. Evaluation of Sybil Attacks Protection Schemes in KAD. In: AIMS'09 - Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services. Vol. 5637. AIMS'09 - Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services. Enschede, The Netherlands: Springer-Verlag; 2009. pp. 70–82. Available from: http://dx.doi.org/10.1007/978-3-642-02627-0_6
2006
Levine BN, Shields C, Margolin BN. A Survey of Solutions to the Sybil Attack. Amherst, MA: University of Massachusetts Amherst; 2006. Available from: http://prisms.cs.umass.edu/brian/pubs/levine.sybil.tr.2006.pdf
Yu H, Kaminsky M, Gibbons PB, Flaxman A. SybilGuard: defending against sybil attacks via social networks. In: SIGCOMM'06. Proceedings of the 2006 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. SIGCOMM'06. Proceedings of the 2006 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Pisa, Italy: ACM; 2006. pp. 267–278. Available from: http://doi.acm.org/10.1145/1159913.1159945
2005
Yang M, Zhang Z, Li X, Dai Y. An empirical study of free-riding behavior in the maze p2p file-sharing system. In: Proceedings of the 4th international conference on Peer-to-Peer Systems. Proceedings of the 4th international conference on Peer-to-Peer Systems. Berlin, Heidelberg: Springer-Verlag; 2005. Available from: http://dx.doi.org/10.1007/11558989_17
Cheng A, Friedman E. Sybilproof reputation mechanisms. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems. Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems. Philadelphia, PA: ACM; 2005. pp. 128–132. Available from: http://doi.acm.org/10.1145/1080192.1080202
2002
Douceur JR. The Sybil Attack. In: IPTPS'01 - Revised Papers from the First International Workshop on Peer-to-Peer Systems. IPTPS'01 - Revised Papers from the First International Workshop on Peer-to-Peer Systems. Cambridge, MA: Springer-Verlag London; 2002. pp. 251–260. Available from: http://dl.acm.org/citation.cfm?id=646334.687813