Quantifying Resistance to the Sybil Attack
- 13 August 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 38 references indexed in Scilit:
- Moderately hard, memory-bound functionsACM Transactions on Internet Technology, 2005
- Inside PageRankACM Transactions on Internet Technology, 2005
- Sybilproof reputation mechanismsPublished by Association for Computing Machinery (ACM) ,2005
- Avoiding ballot stuffing in eBay-like reputation systemsPublished by Association for Computing Machinery (ACM) ,2005
- Group Spreading: A Protocol for Provably Secure Distributed Name ServiceLecture Notes in Computer Science, 2004
- Exchange-based incentive mechanisms for peer-to-peer file sharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Tor: The Second-Generation Onion RouterPublished by Defense Technical Information Center (DTIC) ,2004
- TAPI: Transactions for Accessing Public InfrastructureLecture Notes in Computer Science, 2003
- Implementing a Reputation-Aware Gnutella ServentLecture Notes in Computer Science, 2002
- PastichePublished by Association for Computing Machinery (ACM) ,2002