Publication | Open Access
An analysis of social network-based Sybil defenses
314
Citations
29
References
2010
Year
Unknown Venue
EngineeringInformation SecurityNetwork AnalysisCommunicationSocial NetworkComputational Social ScienceSocial Network SecurityMultiple IdentitySybil DefenseSocial Network AnalysisCommunity NetworkSocial NetworksData PrivacySocial Network AggregationData SecurityCommunity StructureNetwork ScienceSocial ComputingTrusted P2pArts
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been proposed, but they differ greatly in the algorithms they use and in the networks upon which they are evaluated. As a result, the research community lacks a clear understanding of how these schemes compare against each other, how well they would work on real-world social networks with different structural properties, or whether there exist other (potentially better) ways of Sybil defense.
| Year | Citations | |
|---|---|---|
Page 1
Page 1