Description
Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf.
Download count: 0
Details
Contributors
- Cárdenas-Haro, José Antonio (Author)
- Konjevod, Goran (Thesis advisor)
- Richa, Andréa W. (Thesis advisor)
- Sen, Arunabha (Committee member)
- Xue, Guoliang (Committee member)
- Arizona State University (Publisher)
Date Created
The date the item was original created (prior to any relationship with the ASU Digital Repositories.)
2010
Subjects
Resource Type
Collections this item is in
Note
- Partial requirement for: Ph.D., Arizona State University, 2010Note typethesis
- Includes bibliographical references (p. 64-65)Note typebibliography
- Field of study: Computer science
Citation and reuse
Statement of Responsibility
José Antonio Cárdenas-Haro