C Lesniewski-Laas - Proceedings of the 1st workshop on Social network …, 2008 - dl.acm.org
Decentralized systems, such as structured overlays, are subject to the Sybil attack, in which
an adversary creates many false identities to increase its influence. This paper describes a …