A Sybil-Proof One-Hop DHT (2008)

by Chris Lesniewski-laas
Venue:Workshop on Social NetworkSystems,Glasgow,Scotland
Citations:19 - 2 self

Active Bibliography

Regaining Control over Cloud and Mobile Data – Roxana Geambasu - 2011
1 X-Vine: Secure and pseudonymous routing in DHTs using social networks – Prateek Mittal, Matthew Caesar, Nikita Borisov - 2011
16 ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies – Prateek Mittal, Nikita Borisov - 2009
4 UIA: A Global Connectivity Architecture for Mobile Personal Devices – Bryan Alexander Ford - 2008
Providing Incentives to Peer-to-Peer Applications – Tsuen Wan “Johnny" Ngan - 2008
Improving Security and Performance in Low Latency Anonymity Networks – Kevin Scott Bauer, Written Kevin Scott Bauer, Prof Dirk Grunwald, Prof Shivakant Mishra - 2011
2 Unblocking the Internet: Social networks foil censors – Yair Sovran, Jinyang Li, Lakshminarayanan Subramanian
1 Censorship-Resistant Communication over Public Networks Michael Rogers Contents – Michael Rogers - 2006
13 Keep your friends close: Incorporating trust into social network-based sybil defenses – Abedelaziz Mohaisen, Yongdae Kim
13 Comet: An active distributed key-value store – Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy
2011 IEEE Symposium on Security and Privacy Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems – Philip W. L. Fong
22 DSybil: Optimal Sybil-Resistance for Recommendation Systems – Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, Feng Xiao - 2009
10 Preventing Sybil attacks by privilege attenuation: A design principle for social network systems – Philip W. L. Fong - 2010
1 New Directions for Self-Destructing Data Systems – Roxana Geambasu, Tadayoshi Kohno, Arvind Krishnamurthy, Amit Levy, Henry Levy, Paul Gardner, Vuze Inc, Vinnie Moscaritolo
73 A Survey of Peer-to-Peer Security Issues – Dan S. Wallach - 2002
2008 IEEE Symposium on Security and Privacy SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks – Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Feng Xiao
55 Eclipse attacks on overlay networks: Threats and defenses – Atul Singh, Tsuen-wan “johnny Ngan, Peter Druschel, Dan S. Wallach - 2006
2 Pisces: Anonymous Communication Using Social Networks – Prateek Mittal, Matthew Wright, Nikita Borisov - 1208
Distributed HashTable – Christophert Lesniewski-laas, M. Frans Kaashoek, Professorterryp Orlando, Christophert Lesniewski-laas - 2010