1 |
J.R. Douceur, "The Sybil Attack," Proc. 1st Int. Workshop Peerto- Peer Syst., Cambridge, MA, USA, Mar. 2002, pp. 251-260.
|
2 |
H. Yu et al., "SybilGuard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Netw., vol. 16, no. 3, 2008, pp. 576-589.
DOI
|
3 |
H. Yu et al., "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks," IEEE/ACM Trans. Netw., vol. 18, no. 3, 2010, pp. 885-898.
DOI
|
4 |
G. Danezis and P. Mittal, "SybilInfer: Detecting Sybil Nodes Using Social Networks," Proc. 16th Netw. Distrib. Syst. Security Symp., San Diego, California, USA, Feb. 2009.
|
5 |
N. Tran et al., "Sybil-Resilient Online Content Voting," Proc. 6th USENIX Symp. Netw. Syst. Design Implementation, Boston, MA, USA, Apr. 2009, pp. 15-28.
|
6 |
B. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Commun. ACM, vol. 13, no. 7, 1970, pp. 422- 426.
DOI
|
7 |
D. Guo et al., "The Dynamic Bloom Filters," IEEE Trans. Knowl. Data Eng., vol. 22, no. 1, 2010, pp. 120-133.
DOI
|
8 |
J. Leskovec et al., "Statistical Properties of Community Structure in Large Social and Information Networks," Proc. WWW, Beijing, China, Apr. 2008, pp. 695-704.
|