How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Zero-knowledge proofs of identity
Journal of Cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Secure communications over insecure channels
Communications of the ACM
The free haven project: distributed anonymous storage service
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Life on the Screen: Identity in the Age of the Internet
Life on the Screen: Identity in the Age of the Internet
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Communities in Cyberspace
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
A Modification of the Fiat-Shamir Scheme
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract)
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
RANDOM '98 Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science
DOS-Resistant Authentication with Client Puzzles
Revised Papers from the 8th International Workshop on Security Protocols
Towards an Archival Intermemory
ADL '98 Proceedings of the Advances in Digital Libraries Conference
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
The Swarm Scalable Storage System
ICDCS '99 Proceedings of the 19th IEEE International Conference on Distributed Computing Systems
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Using client puzzles to protect TLS
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Establishing identity without certification authorities
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Anonymizing Censorship Resistant Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Implementing a Reputation-Aware Gnutella Servent
Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Farsite: federated, available, and reliable storage for an incompletely trusted environment
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Pastiche: making backup cheap and easy
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Secure routing for structured peer-to-peer overlay networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Preserving peer replicas by rate-limited sampled voting
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Samsara: honor among thieves in peer-to-peer storage
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
SHARP: an architecture for secure resource peering
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Admission control in Peer-to-Peer: design and performance evaluation
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Limited reputation sharing in P2P systems
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Robust incentive techniques for peer-to-peer networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Pagoda: a dynamic overlay network for routing, data management, and multicasting
Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures
Security for wireless sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Faithfulness in internet algorithms
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
On the Security of Polling Protocols in Peer-to-Peer Systems
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Detection and prevention of MAC layer misbehavior in ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Proceedings of the 11th ACM conference on Computer and communications security
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
The LOCKSS peer-to-peer digital preservation system
ACM Transactions on Computer Systems (TOCS)
Defending a P2P Digital Preservation System
IEEE Transactions on Dependable and Secure Computing
ExchangeGuard: A Distributed Protocol for Electronic Fair-Exchange
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Farsite: federated, available, and reliable storage for an incompletely trusted environment
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Pastiche: making backup cheap and easy
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
How to spread adversarial nodes?: rotate!
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
A robust open ascending-price multi-unit auction protocol against false-name bids
Decision Support Systems - Special issue: The fourth ACM conference on electronic commerce
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Strong pseudonymous communication for peer-to-peer reputation systems
Proceedings of the 2005 ACM symposium on Applied computing
On the establishment of distinct identities in overlay networks
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
OpenDHT: a public DHT service and its uses
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Incentives in BitTorrent induce free riding
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Sybilproof reputation mechanisms
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Fighting peer-to-peer SPAM and decoys with object reputation
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
The claim tool kit for ad hoc recognition of peer entities
Science of Computer Programming - Special issue on principles and practice of programming in java (PPPJ 2003)
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks
IEEE Transactions on Dependable and Secure Computing
BAR fault tolerance for cooperative services
Proceedings of the twentieth ACM symposium on Operating systems principles
Vigilante: end-to-end containment of internet worms
Proceedings of the twentieth ACM symposium on Operating systems principles
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
On the cost-ineffectiveness of redundancy in commercial P2P computing
Proceedings of the 12th ACM conference on Computer and communications security
A secured hierarchical trust management framework for public computing utilities
CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Overcoming free-riding behavior in peer-to-peer systems
ACM SIGecom Exchanges
CAPTRA: coordinated packet traceback
Proceedings of the 5th international conference on Information processing in sensor networks
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
On classifying access control implementations for distributed systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
The design of a robust peer-to-peer system
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
One ring to rule them all: service discovery and binding in structured peer-to-peer overlay networks
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
AP3: cooperative, decentralized anonymous communication
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Impeding attrition attacks in P2P systems
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Defending against eclipse attacks on overlay networks
Proceedings of the 11th workshop on ACM SIGOPS European workshop
WiFiProfiler: cooperative diagnosis in wireless LANs
Proceedings of the 4th international conference on Mobile systems, applications and services
Efficiency and nash equilibria in a scrip system for P2P networks
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
FeedEx: collaborative exchange of news feeds
Proceedings of the 15th international conference on World Wide Web
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Taxonomy of trust: categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
An efficient and secure protocol for sensor network time synchronization
Journal of Systems and Software
A probabilistic voting-based filtering scheme in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Towards a scalable and robust DHT
Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
ACM SIGOPS Operating Systems Review
Towards automatic social bootstrapping of peer-to-peer protocols
ACM SIGOPS Operating Systems Review
IEEE Internet Computing
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Virtual ring routing: network routing inspired by DHTs
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Enforcing cooperative resource sharing in untrusted P2P computing environments
Mobile Networks and Applications
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
IQU: practical queue-based user association management for WLANs
Proceedings of the 12th annual international conference on Mobile computing and networking
Modeling Ad-hoc rushing attack in a negligibility-based security framework
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
SCUBA: Secure Code Update By Attestation in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Visualization assisted detection of sybil attacks in wireless networks
Proceedings of the 3rd international workshop on Visualization for computer security
Providing witness anonymity in peer-to-peer systems
Proceedings of the 13th ACM conference on Computer and communications security
Salsa: a structured approach to large-scale anonymity
Proceedings of the 13th ACM conference on Computer and communications security
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
A Bayesian game approach for intrusion detection in wireless ad hoc networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Reputation in self-organized communication systems and beyond
Interperf '06 Proceedings from the 2006 workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications sytems
Inner-Circle Consistency for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Fireflies: scalable support for intrusion-tolerant network overlays
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Experiences in building and operating ePOST, a reliable peer-to-peer application
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Securing decentralized reputation management using TrustGuard
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Attrition defenses for a peer-to-peer digital preservation system
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Glacier: highly durable, decentralized storage despite massive correlated failures
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
SkipNet: a scalable overlay network with practical locality properties
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
Backbone construction in selfish wireless networks
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
A methodology for verification of digital items in fair exchange protocols with active trustee
Electronic Commerce Research
ACM Transactions on Sensor Networks (TOSN)
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Towards Trustworthy Spatial Messaging
Electronic Notes in Theoretical Computer Science (ENTCS)
Support for resilient Peer-to-Peer gaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
A new security scheme for on-demand source routing in mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Toward an optimal social network defense against Sybil attacks
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
A scalable public key management scheme in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Lottery trees: motivational deployment of networked systems
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
FairPeers: Efficient Profit Sharing in Fair Peer-to-Peer Market Places
Journal of Network and Systems Management
Providing VANET security through active position detection
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Challenge: peers on wheels - a road to new traffic information systems
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Surviving attacks on disruption-tolerant networks without authentication
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Exploiting KAD: possible uses and misuses
ACM SIGCOMM Computer Communication Review
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic trust assessment of software services
2nd international workshop on Service oriented software engineering: in conjunction with the 6th ESEC/FSE joint meeting
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Low-resource routing attacks against tor
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Making p2p accountable without losing privacy
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Proceedings of the 14th ACM conference on Computer and communications security
Denial of service or denial of security?
Proceedings of the 14th ACM conference on Computer and communications security
Harvesting verifiable challenges from oblivious online sources
Proceedings of the 14th ACM conference on Computer and communications security
Interactive wormhole detection and evaluation
Information Visualization
Globally decoupled reputations for large distributed networks
Advances in Multimedia
A service-centric approach to access control and monitoring based on distributed trust
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
Passive-Logging Attacks Against Anonymous Communications Systems
ACM Transactions on Information and System Security (TISSEC)
Secure routing based on distributed key sharing in large-scale sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Secure content access and replication in pure P2P networks
Computer Communications
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Mind your manners: socially appropriate wireless key establishment for groups
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Self-certified Sybil-free pseudonyms
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Security against probe-response attacks in collaborative intrusion detection
Proceedings of the 2007 workshop on Large scale attack defense
INCA: qualitative reference framework for incentive mechanisms in P2P networks
International Journal of Computer Applications in Technology
C2: a new overlay network based on CAN and Chord
International Journal of High Performance Computing and Networking
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Towards application-aware anonymous routing
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search
Proceedings of the 2008 ACM symposium on Applied computing
CAT: a context-aware trust model for open and dynamic systems
Proceedings of the 2008 ACM symposium on Applied computing
Dandelion: cooperative content distribution with robust incentives
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Securing wireless communication against wormhole attacks
EHAC'05 Proceedings of the 4th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Secure sensor network routing: a clean-slate approach
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Authentication in stealth distributed hash tables
Journal of Systems Architecture: the EUROMICRO Journal
Practical trust management without reputation in peer-to-peer games
Multiagent and Grid Systems - Grid Computing, high performance and distributed applications
Securing Ad Hoc Storage through Probabilistic Cooperation Assessment
Electronic Notes in Theoretical Computer Science (ENTCS)
On spreading recommendations via social gossip
Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures
An access control mechanism for P2P collaborations
DaMaP '08 Proceedings of the 2008 international workshop on Data management in peer-to-peer systems
HELC: a High Efficiency and Low Cost structured Peer-to-Peer overlay without Distributed Hash Table
International Journal of Autonomous and Adaptive Communications Systems
One hop reputations for peer to peer file sharing workloads
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Ostra: leveraging trust to thwart unwanted communication
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Phalanx: withstanding multimillion-node botnets
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Providing VANET security through active position detection
Computer Communications
A mechanism to enforce privacy in vehicle-to-infrastructure communication
Computer Communications
Design and implementation trade-offs for wide-area resource discovery
ACM Transactions on Internet Technology (TOIT)
Do social networks improve e-commerce?: a study on social marketplaces
Proceedings of the first workshop on Online social networks
SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
Brahms: byzantine resilient random membership sampling
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Bittorrent is an auction: analyzing and improving bittorrent's incentives
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
MobiRate: making mobile raters stick to their word
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
GAnGS: gather, authenticate 'n group securely
Proceedings of the 14th ACM international conference on Mobile computing and networking
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
Location-based trust for mobile user-generated content: applications, challenges and implementations
Proceedings of the 9th workshop on Mobile computing systems and applications
Peer-to-Peer Large-Scale Collaborative Storage Networks
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
Trust-Rated Authentication for Domain-Structured Distributed Systems
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Deterministic Secure Positioning in Wireless Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Enhancing an Integer Challenge-Response Protocol
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
PSH: A Private and Shared History-Based Incentive Mechanism
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
A Distributed Certification System for Structured P2P Networks
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Metrics for Security and Performance in Low-Latency Anonymity Systems
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Quantifying Resistance to the Sybil Attack
Financial Cryptography and Data Security
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Financial Cryptography and Data Security
Secure Forwarding in DHTs - Is Redundancy the Key to Robustness?
Euro-Par '08 Proceedings of the 14th international Euro-Par conference on Parallel Processing
Trust Management for Host-Based Collaborative Intrusion Detection
DSOM '08 Proceedings of the 19th IFIP/IEEE international workshop on Distributed Systems: Operations and Management: Managing Large-Scale Service Deployment
Proceedings of the 1st Workshop on Social Network Systems
An offline foundation for online accountable pseudonyms
Proceedings of the 1st Workshop on Social Network Systems
TSR: trust-based secure MANET routing using HMMs
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Vigilante: End-to-end containment of Internet worm epidemics
ACM Transactions on Computer Systems (TOCS)
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
Information leaks in structured peer-to-peer anonymous communication systems
Proceedings of the 15th ACM conference on Computer and communications security
Robust content-driven reputation
Proceedings of the 1st ACM workshop on Workshop on AISec
Attack-tolerant localization via iterative verification of locations in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Peer production of structured knowledge -: an empirical study of ratings and incentive mechanisms
Proceedings of the 17th ACM conference on Information and knowledge management
Sybil proof anonymous reputation management
Proceedings of the 4th international conference on Security and privacy in communication netowrks
RepTrap: a novel attack on feedback-based reputation systems
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Overbot: a botnet protocol based on Kademlia
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Enforcing behaviour with anonymity
Proceedings of the workshop on Applications of private and anonymous communications
A resilient architecture for DHT-based distributed collaborative environments
Proceedings of the 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
International Journal of Advanced Media and Communication
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Resilient software mirroring with untrusted third parties
Proceedings of the 1st International Workshop on Hot Topics in Software Upgrades
Byzantine Consensus with Unknown Participants
OPODIS '08 Proceedings of the 12th International Conference on Principles of Distributed Systems
Load-Balanced and Sybil-Resilient File Search in P2P Networks
OPODIS '08 Proceedings of the 12th International Conference on Principles of Distributed Systems
Robust random number generation for peer-to-peer systems
Theoretical Computer Science
Hop chains: Secure routing and the establishment of distinct identities
Theoretical Computer Science
An incentive compatible reputation mechanism for ubiquitous computing environments
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Trust Management Model and Evaluation Method for Online Travel
Computer Supported Cooperative Work in Design IV
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Scrivener: providing incentives in cooperative content distribution systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Multicast Encryption Infrastructure for Security in Sensor Networks
International Journal of Distributed Sensor Networks
Pervasive and Mobile Computing
User interactions in social networks and their implications
Proceedings of the 4th ACM European conference on Computer systems
Random Visitor: Defense against Identity Attacks in P2P Networks
IEICE - Transactions on Information and Systems
P2P Networking and Applications
P2P Networking and Applications
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
A trust management framework for service-oriented environments
Proceedings of the 18th international conference on World wide web
Secure routing in peer-to-peer distributed hash tables
Proceedings of the 2009 ACM symposium on Applied Computing
Incorporating accountability into internet email
Proceedings of the 2009 ACM symposium on Applied Computing
Security against Sybil Attack in Wireless Sensor Network through Location Verification
ICDCN '09 Proceedings of the 10th International Conference on Distributed Computing and Networking
Towards complete node enumeration in a peer-to-peer botnet
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
An Activeness-Based Seed Choking Algorithm for Enhancing BitTorrent's Robustness
GPC '09 Proceedings of the 4th International Conference on Advances in Grid and Pervasive Computing
Robust live media streaming in swarms
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Peer-assisted content distribution with prices
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
Distributed data source verification in wireless sensor networks
Information Fusion
Sybil-resilient online content voting
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
Pricing traffic in a spanning network
Proceedings of the 10th ACM conference on Electronic commerce
Sybilproof transitive trust protocols
Proceedings of the 10th ACM conference on Electronic commerce
Brahms: Byzantine resilient random membership sampling
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Kademlia-Based Node Lookup System for Anonymization Networks
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
PeerVote: A Decentralized Voting Mechanism for P2P Collaboration Systems
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
Evaluation of Sybil Attacks Protection Schemes in KAD
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
A Distributed and Oblivious Heap
ICALP '09 Proceedings of the 36th Internatilonal Collogquium on Automata, Languages and Programming: Part II
Framework for Decentralizing Legacy Applications
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
Collusion Detection for Grid Computing
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Mapping Social Networks into P2P Directory Service
SOCINFO '09 Proceedings of the 2009 International Workshop on Social Informatics
Assessing Robustness of Reputation Systems Regarding Interdependent Manipulations
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
IPBGA: a hybrid P2P based grid architecture by using information pool protocol
The Journal of Supercomputing
PeerTIS: a peer-to-peer traffic information system
Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Wireless multihoming modeled as a multi-WLAN game
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Taxonomy of trust: Categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Evidence processing and privacy issues in evidence-based reputation systems
Computer Standards & Interfaces
IEEE Transactions on Information Forensics and Security
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Proceedings of the 16th ACM conference on Computer and communications security
As-awareness in Tor path selection
Proceedings of the 16th ACM conference on Computer and communications security
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Mnikr: reputation construction through human trading of distributed social identities
Proceedings of the 5th ACM workshop on Digital identity management
Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
Computer Networks: The International Journal of Computer and Telecommunications Networking
Long term study of peer behavior in the KAD DHT
IEEE/ACM Transactions on Networking (TON)
TACKing together efficient authentication, revocation, and privacy in VANETs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Privacy preserving social networking through decentralization
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
Robust and scalable trust management for collaborative intrusion detection
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
International Journal of Security and Networks
Detection and Defense of Identity Attacks in P2P Network
ISICA '09 Proceedings of the 4th International Symposium on Advances in Computation and Intelligence
Anonymity and Censorship Resistance in Unstructured Overlay Networks
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Enhanced Fault-Tolerance through Byzantine Failure Detection
OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
Electric Routing and Concurrent Flow Cutting
ISAAC '09 Proceedings of the 20th International Symposium on Algorithms and Computation
Pseudonyms in Cost-Sharing Games
WINE '09 Proceedings of the 5th International Workshop on Internet and Network Economics
A robust open ascending-price multi-unit auction protocol against false-name bids
Decision Support Systems - Special issue: The fourth ACM conference on electronic commerce
Researches on secure proximity distance defending attack of finger table based on chord
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
P2P attack taxonomy and relationship analysis
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Resisting node spoofing attacks in random key predistribution schemes: a uniform design
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Architecture and incentive design of integrated cellular and disruption tolerant networks
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Towards a robust pollution control mechanism for P2P file sharing systems
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
A sybil-proof referral system based on multiplicative reputation chains
IEEE Communications Letters
Robust and efficient incentives for cooperative content distribution
IEEE/ACM Transactions on Networking (TON)
ACM Transactions on Computer Systems (TOCS)
Toward trustworthy mobile sensing
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
WTR: a reputation metric for distributed hash tables based on a risk and credibility factor
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
Distributed node authentication in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Security considerations for the wireless HART protocol
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
A market-based approach to managing the risk of peer-to-peer transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Detecting Wikipedia vandalism via spatio-temporal analysis of revision metadata?
Proceedings of the Third European Workshop on System Security
Managing trust and reputation in the XenoServer open platform
iTrust'03 Proceedings of the 1st international conference on Trust management
Enforcing collaboration in peer-to-peer routing services
iTrust'03 Proceedings of the 1st international conference on Trust management
A peer-to-peer indexing service for data grids
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
Random visitor: a defense against identity attacks in P2P overlay networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
Computer Standards & Interfaces
Measurement-calibrated graph models for social network experiments
Proceedings of the 19th international conference on World wide web
Distributed dynamic protection of services on ad hoc and peer to peer networks
IPOM'07 Proceedings of the 7th IEEE international conference on IP operations and management
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Manipulation-resistant reputations using hitting time
WAW'07 Proceedings of the 5th international conference on Algorithms and models for the web-graph
Attacking unlinkability: the importance of context
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Nymble: anonymous IP-address blocking
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Preventing privacy-invasive software using collaborative reputation systems
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Self-stabilizing and Byzantine-tolerant overlay network
OPODIS'07 Proceedings of the 11th international conference on Principles of distributed systems
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Informant: detecting sybils using incentives
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
PPAA: peer-to-peer anonymous authentication
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
A self-certified and Sybil-free framework for secure digital identity domain buildup
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Availability for DHT-based overlay networks with unidirectional routing
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Using TPMs to secure vehicular ad-hoc networks (VANETs)
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Evaluating peer-to-peer for loosely coupled business collaboration: a case study
BPM'07 Proceedings of the 5th international conference on Business process management
Using social networks to distort users' profiles generated by web search engines
Computer Networks: The International Journal of Computer and Telecommunications Networking
Topology-aware routing in structured peer-to-peer overlay networks
Future directions in distributed computing
A lightweight secure architecture for wireless sensor networks
International Journal of Internet Technology and Secured Transactions
Proceedings of the 2010 ACM-BCS Visions of Computer Science Conference
Accountable file indexing against DDoS attacks in peer-to-peer networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Collaborative anomaly detection for structured P2P networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
Anonymous and authenticated routing in multi-hop cellular networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Avoiding eclipse attacks on kad/kademlia: an identity based approach
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Assigning trust to Wikipedia content
WikiSym '08 Proceedings of the 4th International Symposium on Wikis
Integrating players, reputation and ranking to manage cheating in MMOGs
Proceedings of the Fifth International Conference on the Foundations of Digital Games
Providing witness anonymity under peer-to-peer settings
IEEE Transactions on Information Forensics and Security
Communications of the ACM
Towards securing data delivery in peer-to-peer streaming
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Cooperation via contracts: stability and algorithms
INFOCOM'10 Proceedings of the 29th conference on Information communications
Sybil attacks against mobile users: friends and foes to the rescue
INFOCOM'10 Proceedings of the 29th conference on Information communications
Maximum damage malware attack in mobile wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Mobicent: a credit-based incentive system for disruption tolerant network
INFOCOM'10 Proceedings of the 29th conference on Information communications
A node-failure-resilient anonymous communication protocol through commutative path hopping
INFOCOM'10 Proceedings of the 29th conference on Information communications
R2M: a reputation model for mashups
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
PlayerRating: a reputation system for multiplayer online games
Proceedings of the 8th Annual Workshop on Network and Systems Support for Games
Resisting free-riding behavior in BitTorrent
Future Generation Computer Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
A privacy-aware architecture for a web rating system
IBM Journal of Research and Development
Interactive detection of network anomalies via coordinated multiple views
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
Rating the raters: a reputation system for wiki-like domains
Proceedings of the 3rd international conference on Security of information and networks
A novel defense mechanism against sybil attacks in VANET
Proceedings of the 3rd international conference on Security of information and networks
FaceTrust: assessing the credibility of online personas via social networks
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Pass it on: social networks stymie censors
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Improving BitTorrent: a simple approach
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Contracts: practical contribution incentives for P2P live streaming
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Whanau: a sybil-proof distributed hash table
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
FlightPath: obedience vs. choice in cooperative services
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Census: location-aware membership management for large-scale distributed systems
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Veracity: practical secure network coordinates via vote-based agreements
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Defense against Sybil attack in vehicular ad hoc network based on roadside unit support
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Trust and distrust in adaptive inter-enterprise collaboration management
Journal of Theoretical and Applied Electronic Commerce Research
Preventing DDoS attacks on internet servers exploiting P2P systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Don't tread on me: moderating access to OSN data with spikestrip
WOSN'10 Proceedings of the 3rd conference on Online social networks
Recruiting new tor relays with BRAIDS
Proceedings of the 17th ACM conference on Computer and communications security
Dissent: accountable anonymous group messaging
Proceedings of the 17th ACM conference on Computer and communications security
Secure latency estimation with treeple
Proceedings of the 17th ACM conference on Computer and communications security
Anonymity and monitoring: how to monitor the infrastructure of an anonymity system
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Dependable filtering: Philosophy and realizations
ACM Transactions on Information Systems (TOIS)
Detecting and characterizing social spam campaigns
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Measuring the mixing time of social graphs
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
A free-rider aware reputation system for peer-to-peer file-sharing networks
Expert Systems with Applications: An International Journal
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
ACM Transactions on Information and System Security (TISSEC)
Collaborative, privacy-preserving data aggregation at scale
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
How to share your favourite search results while preserving privacy and quality
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
Secure multi-agent system for multi-hop environments
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Secure routing strategies in DHT-based systems
Globe'10 Proceedings of the Third international conference on Data management in grid and peer-to-peer systems
Providing mobile users' anonymity in hybrid networks
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Empirical tests of anonymous voice over IP
Journal of Network and Computer Applications
A novel node level security policy framework for wireless sensor networks
Journal of Network and Computer Applications
The design of a reliable reputation system
Electronic Commerce Research
A case study in ethical decision making regarding remote mitigation of botnets
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
A proposal for coalition networking in dynamic operational environments
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Identity theft protection in structured overlays
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Neighbourhood maps: decentralised ranking in small-world P2P networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Improving cooperation in peer-to-peer systems using social networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Privacy-aware presence management in instant messaging systems
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
An authentication protocol in web-computing
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Spam mitigation using spatio-temporal reputations from blacklist history
Proceedings of the 26th Annual Computer Security Applications Conference
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
Comet: an active distributed key-value store
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Crawling BitTorrent DHTs for fun and profit
WOOT'10 Proceedings of the 4th USENIX conference on Offensive technologies
Detecting sybil nodes in static and dynamic networks
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Repelling Sybil-type attacks in wireless ad hoc systems
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
A new monitor model for enhancing trust-based systems
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Towards a secure rendezvous network for future publish/subscribe architectures
FIS'10 Proceedings of the Third future internet conference on Future internet
AdContRep: a privacy enhanced reputation system for MANET content services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
SocialFilter: introducing social trust to collaborative spam mitigation
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
Private yet abuse resistant open publishing
Proceedings of the 15th international conference on Security protocols
Uniform and ergodic sampling in unstructured peer-to-peer systems with malicious nodes
OPODIS'10 Proceedings of the 14th international conference on Principles of distributed systems
Proceedings of the 2011 International Conference on Communication, Computing & Security
Ant colony based approach for intrusion detection on cluster heads in WSN
Proceedings of the 2011 International Conference on Communication, Computing & Security
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Sybil attack detection based on signature vectors in VANETs
International Journal of Critical Computer-Based Systems
Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
Journal of Network and Systems Management
The need for interoperable reputation systems
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Foundations and Trends in Information Retrieval
Privad: practical privacy in online advertising
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Bazaar: strengthening user reputations in online marketplaces
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Do incentives build robustness in bit torrent
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Efficient and secure threshold-based event validation for VANETs
Proceedings of the fourth ACM conference on Wireless network security
Electric routing and concurrent flow cutting
Theoretical Computer Science
Using predictable mobility patterns to support scalable and secure MANETs of handheld devices
MobiArch '11 Proceedings of the sixth international workshop on MobiArch
Defending against Sybil nodes in BitTorrent
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II
Traffic localization for DHT-based BitTorrent networks
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II
A design for securing data delivery in mesh-based peer-to-peer streaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
Deterministic secure positioning in wireless sensor networks
Theoretical Computer Science
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
A content propagation metric for efficient content distribution
Proceedings of the ACM SIGCOMM 2011 conference
Structural trend analysis for online social networks
Proceedings of the VLDB Endowment
Cyberdice: peer-to-peer gambling in the presence of cheaters
Security'08 Proceedings of the 16th International conference on Security protocols
Anonygator: privacy and integrity preserving data aggregation
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
Reverse social engineering attacks in online social networks
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
Beyond simulation: large-scale distributed emulation of P2P protocols
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
Effective digital forensics research is investigator-centric
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
Telex: anticensorship in the network infrastructure
SEC'11 Proceedings of the 20th USENIX conference on Security
Secure position verification for wireless sensor networks in noisy channels
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Improved access control mechanism in vehicular ad hoc networks
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Sybil defenses via social networks: a tutorial and survey
ACM SIGACT News
TRAP: open decentralized distributed spam filtering
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
AdPriRec: a context-aware recommender system for user privacy in MANET services
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
A survey of security issues in trust and reputation systems for E-commerce
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Autonomous link spam detection in purely collaborative environments
Proceedings of the 7th International Symposium on Wikis and Open Collaboration
Silverline: toward data confidentiality in storage-intensive cloud applications
Proceedings of the 2nd ACM Symposium on Cloud Computing
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
ACM Transactions on Information and System Security (TISSEC)
Economic incentives for protecting digital rights online
Electronic Commerce Research and Applications
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
A survey on trust management for intelligent transportation system
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Review: A survey on content-centric technologies for the current Internet: CDN and P2P solutions
Computer Communications
A sybil attack detection approach using neighboring vehicles in VANET
Proceedings of the 4th international conference on Security of information and networks
YouProve: authenticity and fidelity in mobile sensing
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
MM '11 Proceedings of the 19th ACM international conference on Multimedia
Floating content for probabilistic information sharing
Pervasive and Mobile Computing
The socialbot network: when bots socialize for fame and money
Proceedings of the 27th Annual Computer Security Applications Conference
Proceedings of the 27th Annual Computer Security Applications Conference
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
Journal of Network and Computer Applications
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
Vulnerabilities and countermeasures in context-aware social rating services
ACM Transactions on Internet Technology (TOIT)
Breaking four mix-related schemes based on universal re-encryption
ISC'06 Proceedings of the 9th international conference on Information Security
Robust random number generation for peer-to-peer systems
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Hop chains: secure routing and the establishment of distinct identities
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Location verification based defense against sybil attack in sensor networks
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
iSpot analysed: participatory learning and reputation
Proceedings of the 1st International Conference on Learning Analytics and Knowledge
Modelling and analysis of attacks on the MANET routing in AODV
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A p2p content authentication protocol based on byzantine agreement
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Jiminy: a scalable incentive-based architecture for improving rating quality
iTrust'06 Proceedings of the 4th international conference on Trust Management
B-Trust: bayesian trust framework for pervasive computing
iTrust'06 Proceedings of the 4th international conference on Trust Management
TATA: towards anonymous trusted authentication
iTrust'06 Proceedings of the 4th international conference on Trust Management
A reputation-based system for confidentiality modeling in peer-to-peer networks
iTrust'06 Proceedings of the 4th international conference on Trust Management
A novel protocol for communicating reputation in p2p networks
iTrust'06 Proceedings of the 4th international conference on Trust Management
The application of collaborative filtering for trust management in p2p communities
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
A secure p2p video conference system for enterprise environments
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
One-Time sensors: a novel concept to mitigate node-capture attacks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Making chord robust to byzantine attacks
ESA'05 Proceedings of the 13th annual European conference on Algorithms
Adaptive Search Radius - Using hop count to reduce P2P traffic
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey of anonymous peer-to-peer file-sharing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Safe and private data sharing with turtle: friends team-up and beat the system
SP'04 Proceedings of the 12th international conference on Security Protocols
Pseudonymity in the light of evidence-based trust
SP'04 Proceedings of the 12th international conference on Security Protocols
Energy conserving security mechanism for wireless sensor network
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Security in p2p networks: survey and research directions
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A self-organized authentication architecture in mobile ad-hoc networks
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Renaming in message passing systems with byzantine failures
DISC'06 Proceedings of the 20th international conference on Distributed Computing
Synchronous batching: from cascades to free routes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On the PET workshop panel “mix cascades versus peer-to-peer: is one concept superior?”
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
A taxonomy of rational attacks
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
An empirical study of free-riding behavior in the maze p2p file-sharing system
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Conservation vs. consensus in peer-to-peer preservation systems
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
AESOP: altruism-endowed self-organizing peers
DBISP2P'04 Proceedings of the Second international conference on Databases, Information Systems, and Peer-to-Peer Computing
Commensal cuckoo: secure group partitioning for large-scale services
ACM SIGOPS Operating Systems Review
SPROUT: P2P routing with social networks
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Securing P2P systems from Sybil attacks through adaptive identity management
Proceedings of the 7th International Conference on Network and Services Management
Trust enforcement in peer-to-peer massive multi-player online games
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II
Robust routing in malicious environment for ad hoc networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Recard: using recommendation cards approach for building trust in peer-to-peer networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
iTrust'05 Proceedings of the Third international conference on Trust Management
Trust transfer: encouraging self-recommendations without sybil attack
iTrust'05 Proceedings of the Third international conference on Trust Management
Risk models for trust-based access Control(TBAC)
iTrust'05 Proceedings of the Third international conference on Trust Management
Combining trust and risk to reduce the cost of attacks
iTrust'05 Proceedings of the Third international conference on Trust Management
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Security for interactions in pervasive networks: applicability of recommendation systems
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Friends troubleshooting network: towards privacy-preserving, automatic troubleshooting
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Robust distributed name service
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks
Mobile Networks and Applications
Orchestrating access control in peer data management systems
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
A flexible framework for secret handshakes
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Breaking the collusion detection mechanism of morphmix
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Alliatrust: a trustable reputation management scheme for unstructured p2p systems
GPC'06 Proceedings of the First international conference on Advances in Grid and Pervasive Computing
Canal: scaling social network-based Sybil tolerance schemes
Proceedings of the 7th ACM european conference on Computer Systems
Effects of a soft cut-off on node-degree in the Twitter social network
Computer Communications
Towards provable security for ubiquitous applications
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Towards practical attacker classification for risk analysis in anonymous communication
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A key management scheme with encoding and improved security for wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Secure remote execution of sequential computations
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Extending trust in peer-to-peer networks
ADBIS'09 Proceedings of the 13th East European conference on Advances in Databases and Information Systems
SocialClouds: concept, security architecture and some mechanisms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Credibility-Based trust management for services in cloud environments
ICSOC'11 Proceedings of the 9th international conference on Service-Oriented Computing
Scrivener: providing incentives in cooperative content distribution systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Trust management issues for ad hoc and self-organized networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Multipath routing protocols for mobile ad hoc networks: security issues and performance evaluation
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Service discovery and provision for autonomic mobile computing
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Wireless sensor replica detection in mobile environments
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Leveraging trust and distrust for sybil-tolerant voting in online social media
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Online social network platforms: toward a model-backed security evaluation
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Performance evaluation of large-scale dynamic systems
ACM SIGMETRICS Performance Evaluation Review
Foisting and stealing of keys in sensor networks
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
Spotting fake reviewer groups in consumer reviews
Proceedings of the 21st international conference on World Wide Web
Towards a smart, self-scaling cooperative web cache
SOFSEM'12 Proceedings of the 38th international conference on Current Trends in Theory and Practice of Computer Science
ARDEN: Anonymous networking in delay tolerant networks
Ad Hoc Networks
AMORES: an architecture for mobiquitous resilient systems
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
Reliable client accounting for P2P-infrastructure hybrids
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Key challenges in defending against malicious socialbots
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Collaborative service evaluation with the TwoHop trust framework
Security and Communication Networks
Peer-to-peer indirect reciprocity via personal currency
Journal of Parallel and Distributed Computing
Trust in collaborative web applications
Future Generation Computer Systems
Opaak: using mobile phones to limit anonymous identities online
Proceedings of the 10th international conference on Mobile systems, applications, and services
Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
The use of reputation as noise-resistant selection bias in a co-evolutionary multi-agent system
Proceedings of the 14th annual conference on Genetic and evolutionary computation
Sybil attack detection through global topology pattern visualization
Information Visualization
Local key management in opportunistic networks
International Journal of Communication Networks and Distributed Systems
GAUR: a method to detect Sybil groups in peer-to-peer overlays
International Journal of Grid and Utility Computing
TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications
Personal and Ubiquitous Computing
Use of ratings from personalized communities for trustworthy application installation
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Efficient and secure decentralized network size estimation
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I
Measuring and fingerprinting click-spam in ad networks
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
Sybil resilient identity distribution in P2P networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
eDonkey & eMule's Kad: Measurements & Attacks
Fundamenta Informaticae
Denial-of-service attacks and countermeasures on BitTorrent
Computer Networks: The International Journal of Computer and Telecommunications Networking
Measuring and fingerprinting click-spam in ad networks
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Innocent by association: early recognition of legitimate users
Proceedings of the 2012 ACM conference on Computer and communications security
DCast: sustaining collaboration in overlay multicast despite rational collusion
Proceedings of the 2012 ACM conference on Computer and communications security
SybilControl: practical sybil defense with computational puzzles
Proceedings of the seventh ACM workshop on Scalable trusted computing
Beyond Social Graphs: User Interactions in Online Social Networks and their Implications
ACM Transactions on the Web (TWEB)
AutoMan: a platform for integrating human-based and digital computation
Proceedings of the ACM international conference on Object oriented programming systems languages and applications
Resilience and security of opportunistic communications for emergency evacuation
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Sophia: A local trust system to secure key-based routing in non-deterministic DHTs
Journal of Parallel and Distributed Computing
An efficient incentive scheme with a distributed authority infrastructure in peer-to-peer networks
Journal of Parallel and Distributed Computing
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks
Proceedings of the Fifth International Conference on Security of Information and Networks
Authenticating operation-based history in collaborative systems
Proceedings of the 17th ACM international conference on Supporting group work
Communication Processes in Participatory Websites
Journal of Computer-Mediated Communication
A secure on-demand source routing scheme using hierarchical clustering in mobile ad hoc networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
On the power of impersonation attacks
DISC'07 Proceedings of the 21st international conference on Distributed Computing
Establishing trust between mail servers to improve spam filtering
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Security rationale for a cooperative backup service for mobile devices
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
Evolution of social-attribute networks: measurements, modeling, and implications using google+
Proceedings of the 2012 ACM conference on Internet measurement conference
Bio-inspired enhancement of reputation systems for intelligent environments
Information Sciences: an International Journal
Cachet: a decentralized architecture for privacy preserving social networking with caching
Proceedings of the 8th international conference on Emerging networking experiments and technologies
KoNKS: konsensus-style network koordinate system
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model
Security and Communication Networks
Journal of Network and Systems Management
Social networks for importing and exporting security
Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management
Maximum damage malware attack in mobile wireless networks
IEEE/ACM Transactions on Networking (TON)
Persea: a sybil-resistant social DHT
Proceedings of the third ACM conference on Data and application security and privacy
Trust Management for VANETs: Challenges, Desired Properties and Future Directions
International Journal of Distributed Systems and Technologies
Proceedings of the 2013 conference on Computer supported cooperative work
Enhancing and identifying cloning attacks in online social networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Proceedings of the VLDB Endowment
Computer Networks: The International Journal of Computer and Telecommunications Networking
The SIC botnet lifecycle model: A step beyond traditional epidemiological models
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
A practical reputation system for pervasive social chatting
Journal of Computer and System Sciences
Providing Users’ Anonymity in Mobile Hybrid Networks
ACM Transactions on Internet Technology (TOIT)
Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments
ACM Transactions on Internet Technology (TOIT)
Proceedings of the 2nd ACM international conference on High confidence networked systems
Countermeasures against sybil attacks in WSN based on proofs-of-work
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Future Generation Computer Systems
Game theory meets network security and privacy
ACM Computing Surveys (CSUR)
Sybil-proof mechanisms in query incentive networks
Proceedings of the fourteenth ACM conference on Electronic commerce
What's a little collusion between friends?
Proceedings of the 2013 ACM symposium on Principles of distributed computing
Fair and resilient incentive tree mechanisms
Proceedings of the 2013 ACM symposium on Principles of distributed computing
SybilCast: broadcast on the open airwaves (extended abstract)
Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures
Proceedings of the 22nd international conference on World Wide Web companion
Iolaus: securing online content rating systems
Proceedings of the 22nd international conference on World Wide Web
Secure content delivery in information-centric networks: design, implementation, and analyses
Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking
Graph-based Sybil detection in social and information systems
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
SafeSlinger: easy-to-use and secure public-key exchange
Proceedings of the 19th annual international conference on Mobile computing & networking
Towards practical communication in Byzantine-resistant DHTs
IEEE/ACM Transactions on Networking (TON)
Assessing data availability of Cassandra in the presence of non-accurate membership
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing
The Journal of Supercomputing
POSTER: Signal anomaly based attack detection in wireless sensor networks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
FPDetective: dusting the web for fingerprinters
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hang with your buddies to resist intersection attacks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Peer-to-peer architectures for massively multiplayer online games: A Survey
ACM Computing Surveys (CSUR)
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
An authentication framework for peer-to-peer cloud
Proceedings of the 6th International Conference on Security of Information and Networks
The man who was there: validating check-ins in location-based services
Proceedings of the 29th Annual Computer Security Applications Conference
International Journal of Ad Hoc and Ubiquitous Computing
Detecting occasional reputation attacks on cloud services
ICWE'13 Proceedings of the 13th international conference on Web Engineering
Review: Vulnerabilities in cognitive radio networks: A survey
Computer Communications
Proactively accountable anonymous messaging in verdict
SEC'13 Proceedings of the 22nd USENIX conference on Security
You are how you click: clickstream analysis for Sybil detection
SEC'13 Proceedings of the 22nd USENIX conference on Security
SGor: Trust graph based onion routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
Uncovering social network Sybils in the wild
ACM Transactions on Knowledge Discovery from Data (TKDD) - Casin special issue
An anonymous distributed routing protocol in mobile ad-hoc networks
The Journal of Supercomputing
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach
The Journal of Supercomputing
Robust Sybil attack defense with information level in online Recommender Systems
Expert Systems with Applications: An International Journal
Towards the integration of reputation management in OpenID
Computer Standards & Interfaces
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems
Journal of Computer and System Sciences
Clone wars: Distributed detection of clone attacks in mobile WSNs
Journal of Computer and System Sciences
Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks
Wireless Personal Communications: An International Journal
A defense against clock skew replication attacks in wireless sensor networks
Journal of Network and Computer Applications
A proof technique for security assessment of on-demand ad hoc routing protocols
International Journal of Security and Networks
Preventing spam in opportunistic networks
Computer Communications
An anonymous DRM scheme for sharing multimedia files in P2P networks
Multimedia Tools and Applications
Hi-index | 0.02 |
Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.