Browsing by Subject "overlay"
Now showing items 1-1 of 1
-
Whanaungatanga: Sybil-proof routing with social networks
(2009-09-24)Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ...