Communications of the ACM
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Robust incentive techniques for peer-to-peer networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Overcoming free-riding behavior in peer-to-peer systems
ACM SIGecom Exchanges
Efficiency and nash equilibria in a scrip system for P2P networks
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Visualization assisted detection of sybil attacks in wireless networks
Proceedings of the 3rd international workshop on Visualization for computer security
Collusion-resistant, incentive-compatible feedback payments
Proceedings of the 8th ACM conference on Electronic commerce
Surviving attacks on disruption-tolerant networks without authentication
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
The influence limiter: provably manipulation-resistant recommender systems
Proceedings of the 2007 ACM conference on Recommender systems
Globally decoupled reputations for large distributed networks
Advances in Multimedia
Incentive compatible ranking systems
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Trust-based recommendation systems: an axiomatic approach
Proceedings of the 17th international conference on World Wide Web
On spreading recommendations via social gossip
Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures
A reputation system for electronic negotiations
Computer Standards & Interfaces
SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
Truthful opinions from the crowds
ACM SIGecom Exchanges
Quantifying Resistance to the Sybil Attack
Financial Cryptography and Data Security
Proceedings of the 1st Workshop on Social Network Systems
Robust content-driven reputation
Proceedings of the 1st ACM workshop on Workshop on AISec
Sybil proof anonymous reputation management
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Gossip-based aggregation of trust in decentralized reputation systems
Autonomous Agents and Multi-Agent Systems
Adding incentives to file-sharing systems
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Sybil-resilient online content voting
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Pricing traffic in a spanning network
Proceedings of the 10th ACM conference on Electronic commerce
Sybilproof transitive trust protocols
Proceedings of the 10th ACM conference on Electronic commerce
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Quantifying incentive compatibility of ranking systems
AAAI'06 Proceedings of the 21st national conference on Artificial intelligence - Volume 1
Mechanisms for making crowds truthful
Journal of Artificial Intelligence Research
An axiomatic approach to personalized ranking systems
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
IEEE Transactions on Information Forensics and Security
Controlling resource hogs in mobile delay-tolerant networks
Computer Communications
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Consistent Continuous Trust-Based Recommendation Systems
WINE '09 Proceedings of the 5th International Workshop on Internet and Network Economics
Pseudonyms in Cost-Sharing Games
WINE '09 Proceedings of the 5th International Workshop on Internet and Network Economics
A sybil-proof referral system based on multiplicative reputation chains
IEEE Communications Letters
An axiomatic approach to personalized ranking systems
Journal of the ACM (JACM)
Manipulation-resistant reputations using hitting time
WAW'07 Proceedings of the 5th international conference on Algorithms and models for the web-graph
Informant: detecting sybils using incentives
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Accountable file indexing against DDoS attacks in peer-to-peer networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Assigning trust to Wikipedia content
WikiSym '08 Proceedings of the 4th International Symposium on Wikis
Hybrid transitive trust mechanisms
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Poisonedwater: An improved approach for accurate reputation ranking in P2P networks
Future Generation Computer Systems
Relating Reputation and Money in Online Markets
ACM Transactions on the Web (TWEB)
Whanau: a sybil-proof distributed hash table
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Dependable filtering: Philosophy and realizations
ACM Transactions on Information Systems (TOIS)
Collusion-resilient credit-based reputations for peer-to-peer content distribution
Proceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation
Empirical tests of anonymous voice over IP
Journal of Network and Computer Applications
The design of a reliable reputation system
Electronic Commerce Research
Neighbourhood maps: decentralised ranking in small-world P2P networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
SocialFilter: introducing social trust to collaborative spam mitigation
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
You share, i share: network effects and economic incentives in P2P file-sharing systems
WINE'10 Proceedings of the 6th international conference on Internet and network economics
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Mechanisms for multi-level marketing
Proceedings of the 12th ACM conference on Electronic commerce
Sum of us: strategyproof selection from the selectors
Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge
Defending against Sybil nodes in BitTorrent
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II
Gridlet economics: resource management models and policies for cycle-sharing systems
GPC'11 Proceedings of the 6th international conference on Advances in grid and pervasive computing
Dirichlet pagerank and trust-based ranking algorithms
WAW'11 Proceedings of the 8th international conference on Algorithms and models for the web graph
Effective digital forensics research is investigator-centric
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
Sybil defenses via social networks: a tutorial and survey
ACM SIGACT News
iSpot analysed: participatory learning and reputation
Proceedings of the 1st International Conference on Learning Analytics and Knowledge
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Collaborative service evaluation with the TwoHop trust framework
Security and Communication Networks
Exploration and visualization of administrator network in wikipedia
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Sybil attack detection through global topology pattern visualization
Information Visualization
An efficient incentive scheme with a distributed authority infrastructure in peer-to-peer networks
Journal of Parallel and Distributed Computing
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
Sybil-proof mechanisms in query incentive networks
Proceedings of the fourteenth ACM conference on Electronic commerce
Fair and resilient incentive tree mechanisms
Proceedings of the 2013 ACM symposium on Principles of distributed computing
A mobile market for agricultural trade in Uganda
Proceedings of the 4th Annual Symposium on Computing for Development
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
COMPARS: toward an empirical approach for comparing the resilience of reputation systems
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Due to the open, anonymous nature of many P2P networks, new identities - or sybils - may be created cheaply and in large numbers. Given a reputation system, a peer may attempt to falsely raise its reputation by creating fake links between its sybils. Many existing reputation mechanisms are not resistant to these types of strategies.Using a static graph formulation of reputation, we attempt to formalize the notion of sybilproofness. We show that there is no symmetric sybilproof reputation function. For nonsymmetric reputations, following the notion of reputation propagation along paths, we give a general asymmetric reputation function based on flow and give conditions for sybilproofness.