Show simple item record

dc.contributor.authorNg, T. S. Eugene
Zhang, Bo
dc.date.accessioned 2017-08-02T22:03:05Z
dc.date.available 2017-08-02T22:03:05Z
dc.date.issued 2008-06-02
dc.identifier.urihttps://hdl.handle.net/1911/96365
dc.description.abstract Recent studies have discovered that the Internet delay space has many interesting properties such as triangle inequality violations (TIV), clustering structures, and constrained growth. Understanding these properties has so far benefited the design of network models and network-performance-aware systems. In this paper, we consider an interesting, previously unexplored connection between Internet delay space properties and network locations. We show that this connection can be exploited to mitigate the Sybil attack problem in peer-to-peer systems.
dc.format.extent 10 pp
dc.language.iso eng
dc.rights You are granted permission for the noncommercial reproduction, distribution, display, and performance of this technical report in any format, but this permission is only for a period of forty-five (45) days from the most recent time that you verified that this technical report is still available from the Computer Science Department of Rice University under terms that include this permission. All other rights are reserved by the author(s).
dc.title Exploiting Internet Delay Space Properties for Sybil Attack Mitigation
dc.type Technical report
dc.date.note June 2, 2008
dc.identifier.digital TR08-02
dc.type.dcmi Text
dc.identifier.citation Ng, T. S. Eugene and Zhang, Bo. "Exploiting Internet Delay Space Properties for Sybil Attack Mitigation." (2008) https://hdl.handle.net/1911/96365.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record