SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. Yu, H., Gibbons, P. B., Kaminsky, M., & Xiao, F. In IEEE Symposium on Security and Privacy, pages 3-17, 2008. IEEE Computer Society. Link Paper bibtex @inproceedings{conf/sp/YuGKX08,
author = {Yu, Haifeng and Gibbons, Phillip B. and Kaminsky, Michael and Xiao, Feng},
booktitle = {IEEE Symposium on Security and Privacy},
crossref = {conf/sp/2008},
ee = {http://doi.ieeecomputersociety.org/10.1109/SP.2008.13},
interhash = {345124fd8e2a3977b375bdb8f9c2b8f8},
intrahash = {105cdc3a1c0e247a4d10e51f8d5deab0},
isbn = {978-0-7695-3168-7},
pages = {3-17},
publisher = {IEEE Computer Society},
title = {SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.},
url = {http://dblp.uni-trier.de/db/conf/sp/sp2008.html#YuGKX08},
year = 2008
}
Downloads: 0
{"_id":"SweNFkKnaCxgY6gJC","bibbaseid":"yu-gibbons-kaminsky-xiao-sybillimitanearoptimalsocialnetworkdefenseagainstsybilattacks-2008","downloads":0,"creationDate":"2016-04-12T13:16:32.124Z","title":"SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.","author_short":["Yu, H.","Gibbons, P. B.","Kaminsky, M.","Xiao, F."],"year":2008,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/kaminski?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Yu"],"firstnames":["Haifeng"],"suffixes":[]},{"propositions":[],"lastnames":["Gibbons"],"firstnames":["Phillip","B."],"suffixes":[]},{"propositions":[],"lastnames":["Kaminsky"],"firstnames":["Michael"],"suffixes":[]},{"propositions":[],"lastnames":["Xiao"],"firstnames":["Feng"],"suffixes":[]}],"booktitle":"IEEE Symposium on Security and Privacy","crossref":"conf/sp/2008","ee":"http://doi.ieeecomputersociety.org/10.1109/SP.2008.13","interhash":"345124fd8e2a3977b375bdb8f9c2b8f8","intrahash":"105cdc3a1c0e247a4d10e51f8d5deab0","isbn":"978-0-7695-3168-7","pages":"3-17","publisher":"IEEE Computer Society","title":"SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.","url":"http://dblp.uni-trier.de/db/conf/sp/sp2008.html#YuGKX08","year":"2008","bibtex":"@inproceedings{conf/sp/YuGKX08,\n author = {Yu, Haifeng and Gibbons, Phillip B. and Kaminsky, Michael and Xiao, Feng},\n booktitle = {IEEE Symposium on Security and Privacy},\n crossref = {conf/sp/2008},\n ee = {http://doi.ieeecomputersociety.org/10.1109/SP.2008.13},\n interhash = {345124fd8e2a3977b375bdb8f9c2b8f8},\n intrahash = {105cdc3a1c0e247a4d10e51f8d5deab0},\n isbn = {978-0-7695-3168-7},\n pages = {3-17},\n publisher = {IEEE Computer Society},\n title = {SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.},\n url = {http://dblp.uni-trier.de/db/conf/sp/sp2008.html#YuGKX08},\n year = 2008\n}\n\n","author_short":["Yu, H.","Gibbons, P. B.","Kaminsky, M.","Xiao, F."],"key":"conf/sp/YuGKX08","id":"conf/sp/YuGKX08","bibbaseid":"yu-gibbons-kaminsky-xiao-sybillimitanearoptimalsocialnetworkdefenseagainstsybilattacks-2008","role":"author","urls":{"Link":"http://doi.ieeecomputersociety.org/10.1109/SP.2008.13","Paper":"http://dblp.uni-trier.de/db/conf/sp/sp2008.html#YuGKX08"},"downloads":0},"search_terms":["sybillimit","near","optimal","social","network","defense","against","sybil","attacks","yu","gibbons","kaminsky","xiao"],"keywords":["dblp"],"authorIDs":[],"dataSources":["ePTwKNCLFT28DzR9b"]}