A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
An analysis of social network-based Sybil defenses
2010
Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM - SIGCOMM '10
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been proposed, but they differ greatly in the algorithms they use and in the networks upon which they are evaluated. As a result, the research community lacks a clear understanding of how these schemes compare against each other, how well they would work on real-world social networks with different structural properties, or
doi:10.1145/1851182.1851226
dblp:conf/sigcomm/ViswanathPGM10
fatcat:cwhiwypjezejlgsff7b5bjnamq