599
edits
(→Topics) |
|||
Line 56: | Line 56: | ||
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf] | | [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf] | ||
|- | |- | ||
| Sybil Attacks and Defense via Social Networks: A good Idea? | | <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (Assigned to Subhash) | ||
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] | | [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] | ||
| [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf] | | [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf] |
edits