SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks. Yu, H., Gibbons, P. B., Kaminsky, M., & Xiao, F. IEEE/ACM Trans. Netw., 18(3):885-898, 2010.
Link
Paper bibtex @article{journals/ton/YuGKX10,
author = {Yu, Haifeng and Gibbons, Phillip B. and Kaminsky, Michael and Xiao, Feng},
ee = {http://dx.doi.org/10.1109/TNET.2009.2034047},
interhash = {400d8f728f19f39b10eefc5b6eeb8c31},
intrahash = {b6796ced3d04fc6f3e2598f5acf03c3f},
journal = {IEEE/ACM Trans. Netw.},
number = 3,
pages = {885-898},
title = {SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks.},
url = {http://dblp.uni-trier.de/db/journals/ton/ton18.html#YuGKX10},
volume = 18,
year = 2010
}
Downloads: 0
{"_id":"FYgBbggK5zfMtu7Hn","bibbaseid":"yu-gibbons-kaminsky-xiao-sybillimitanearoptimalsocialnetworkdefenseagainstsybilattacks-2010","downloads":0,"creationDate":"2016-04-12T13:16:34.518Z","title":"SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks.","author_short":["Yu, H.","Gibbons, P. B.","Kaminsky, M.","Xiao, F."],"year":2010,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/kaminski?items=1000","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Yu"],"firstnames":["Haifeng"],"suffixes":[]},{"propositions":[],"lastnames":["Gibbons"],"firstnames":["Phillip","B."],"suffixes":[]},{"propositions":[],"lastnames":["Kaminsky"],"firstnames":["Michael"],"suffixes":[]},{"propositions":[],"lastnames":["Xiao"],"firstnames":["Feng"],"suffixes":[]}],"ee":"http://dx.doi.org/10.1109/TNET.2009.2034047","interhash":"400d8f728f19f39b10eefc5b6eeb8c31","intrahash":"b6796ced3d04fc6f3e2598f5acf03c3f","journal":"IEEE/ACM Trans. Netw.","number":"3","pages":"885-898","title":"SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks.","url":"http://dblp.uni-trier.de/db/journals/ton/ton18.html#YuGKX10","volume":"18","year":"2010","bibtex":"@article{journals/ton/YuGKX10,\n author = {Yu, Haifeng and Gibbons, Phillip B. and Kaminsky, Michael and Xiao, Feng},\n ee = {http://dx.doi.org/10.1109/TNET.2009.2034047},\n interhash = {400d8f728f19f39b10eefc5b6eeb8c31},\n intrahash = {b6796ced3d04fc6f3e2598f5acf03c3f},\n journal = {IEEE/ACM Trans. Netw.},\n number = 3,\n pages = {885-898},\n title = {SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks.},\n url = {http://dblp.uni-trier.de/db/journals/ton/ton18.html#YuGKX10},\n volume = 18,\n year = 2010\n}\n\n","author_short":["Yu, H.","Gibbons, P. B.","Kaminsky, M.","Xiao, F."],"key":"journals/ton/YuGKX10","id":"journals/ton/YuGKX10","bibbaseid":"yu-gibbons-kaminsky-xiao-sybillimitanearoptimalsocialnetworkdefenseagainstsybilattacks-2010","role":"author","urls":{"Link":"http://dx.doi.org/10.1109/TNET.2009.2034047","Paper":"http://dblp.uni-trier.de/db/journals/ton/ton18.html#YuGKX10"},"downloads":0},"search_terms":["sybillimit","near","optimal","social","network","defense","against","sybil","attacks","yu","gibbons","kaminsky","xiao"],"keywords":["dblp"],"authorIDs":[],"dataSources":["ePTwKNCLFT28DzR9b"]}