Login / Signup

The Sybil Attack.

John R. Douceur
Published in: IPTPS (2002)
Keyphrases
  • malicious users
  • detection mechanism
  • malicious nodes
  • countermeasures
  • secret key
  • neural network
  • information systems
  • dos attacks
  • e learning
  • cyber attacks
  • abstract argumentation
  • data corruption