Skip to search formSkip to main contentSkip to account menu

Sybil attack

Known as: Pseudospoofing, Sybil problem, Sybilattack 
The Sybil attack in computer security is an attack wherein a reputation system is subverted by forging identities in peer-to-peer networks. It is… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Sybil attack is when one node gains identity of another node. This in one of the dangerous attacks that can give rise to other… 
2016
2016
In recent years, vehicular networks have been drawing special attention because of its significant potential role in future smart… 
Highly Cited
2015
Highly Cited
2015
On a crowd sourcing platform consisting of task publishers and workers, it is critical for a task publisher to select trustworthy… 
Review
2014
Review
2014
Mobile social networking is a pervasive communication platform where users with smartphones can search over the Internet and… 
2014
2014
Vehicular communication intends to improve the traffic safety for decreasing number of accidents and manages traffic for saving… 
Highly Cited
2013
Highly Cited
2013
In this article we focus on the security in cognitive radio, which is one of the needs for new technologies requiring spectrum… 
2011
2011
How can we protect sensitive data of average users? In this paper, we propose taking advantage of real-life social trust between… 
2010
2010
In decentralized dynamic networks such as peer-to-peer networks, it is difficult to authorize identities without a centralized… 
Review
2009
Review
2009
Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it… 
Highly Cited
1990
Highly Cited
1990
Composite image, optically encoded by escort-craft of the trans-Channel airship Lord Brunel: aerial view of suburban Cherbourg…