Sciweavers

2492 search results - page 85 / 499
» False-Name-Proofness in Social Networks
Sort
View
IPTPS
2004
Springer
14 years 1 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 3 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
WASA
2009
Springer
141views Algorithms» more  WASA 2009»
14 years 2 months ago
Design and Implementation of Davis Social Links OSN Kernel
Social network popularity continues to rise as they broaden out to more users. Hidden away within these social networks is a valuable set of data that outlines everyone’s relatio...
Thomas Tran, Kelcey Chan, Shaozhi Ye, Prantik Bhat...
INFOCOM
2011
IEEE
12 years 11 months ago
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd
—Opportunistic ad-hoc communication enables portable devices such as smartphones to effectively exchange information, taking advantage of their mobility and locality. The nature ...
Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannid...
CHI
2009
ACM
14 years 2 months ago
Tagged photos: concerns, perceptions, and protections
Photo sharing has become a popular feature of many online social networking sites. Many of the photo sharing applications on these sites, allow users to annotate photos with those...
Andrew Besmer, Heather Richter Lipford