Sciweavers

SP   2008 IEEE Symposium on Security and Privacy
Wall of Fame | Most Viewed SP-2008 Paper
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
14 years 5 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source285
2Download preprint from source195
3Download preprint from source187
4Download preprint from source176
5Download preprint from source162
6Download preprint from source159
7Download preprint from source144
8Download preprint from source140
9Download preprint from source138
10Download preprint from source138
11Download preprint from source134
12Download preprint from source134
13Download preprint from source134
14Download preprint from source133
15Download preprint from source132
16Download preprint from source132
17Download preprint from source129
18Download preprint from source127
19Download preprint from source122
20Download preprint from source120
21Download preprint from source119
22Download preprint from source118
23Download preprint from source117
24Download preprint from source115
25Download preprint from source115
26Download preprint from source113
27Download preprint from source113
28Download preprint from source112
29Download preprint from source112
30Download preprint from source110
31Download preprint from source110
32Download preprint from source103
33Download preprint from source102
34Download preprint from source100
35Download preprint from source96
36Download preprint from source94
37Download preprint from source94
38Download preprint from source92
39Download preprint from source86