The following publications are possibly variants of this publication:
- SybilLimit: A Near-Optimal Social Network Defense Against Sybil AttacksHaifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao. ton, 18(3):885-898, 2010. [doi]
- Toward an optimal social network defense against Sybil attacksHaifeng Yu, Phillip B. Gibbons, Michael Kaminsky. podc 2007: 376-377 [doi]
- SybilGuard: defending against sybil attacks via social networksHaifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman. sigcomm 2006: 267-278 [doi]
- SybilGuard: defending against sybil attacks via social networksHaifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham D. Flaxman. ton, 16(3):576-589, 2008. [doi]
- k-symmetry model for identity anonymization in social networksWentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zhihui Wang. edbt 2010: 111-122 [doi]