Sciweavers

6696 search results - page 17 / 1340
» Securing social networks
Sort
View
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
14 years 3 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...
SIGECOM
2008
ACM
122views ECommerce» more  SIGECOM 2008»
13 years 8 months ago
On the windfall of friendship: inoculation strategies on social networks
This paper studies a virus inoculation game on social networks. A framework is presented which allows the measuring of the windfall of friendship, i.e., how much players benefit i...
Dominic Meier, Yvonne Anne Oswald, Stefan Schmid, ...
ICONFERENCE
2012
12 years 4 months ago
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
Blase Ur, Yang Wang
SIGCOMM
2010
ACM
13 years 9 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...