{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:12:33Z","timestamp":1730315553557,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,10]]},"DOI":"10.1145\/2168836.2168867","type":"proceedings-article","created":{"date-parts":[[2012,4,10]],"date-time":"2012-04-10T12:19:38Z","timestamp":1334060378000},"page":"309-322","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Canal"],"prefix":"10.1145","author":[{"given":"Bimal","family":"Viswanath","sequence":"first","affiliation":[{"name":"MPI-SWS, Kaiserslautern-Saarbruecken, Germany"}]},{"given":"Mainack","family":"Mondal","sequence":"additional","affiliation":[{"name":"MPI-SWS, Kaiserslautern-Saarbruecken, Germany"}]},{"given":"Krishna P.","family":"Gummadi","sequence":"additional","affiliation":[{"name":"MPI-SWS, Kaiserslautern-Saarbruecken, Germany"}]},{"given":"Alan","family":"Mislove","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Ansley","family":"Post","sequence":"additional","affiliation":[{"name":"MPI-SWS, Kaiserslautern-Saarbruecken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,4,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064340.1064341"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.10"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844156"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452528"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993574.1993597"},{"volume-title":"Proceedings of the 16th Network and Distributed System Security Symposium (NDSS'09)","year":"2009","author":"Danezis G.","key":"e_1_3_2_1_6_1","unstructured":"G. Danezis and P. Mittal . SybilInfer: Detecting Sybil nodes using social networks . In Proceedings of the 16th Network and Distributed System Security Symposium (NDSS'09) , 2009 . G. Danezis and P. Mittal. SybilInfer: Detecting Sybil nodes using social networks. In Proceedings of the 16th Network and Distributed System Security Symposium (NDSS'09), 2009."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718537"},{"volume-title":"An algorithm for the solution of the max-flow problem with the polynomial estimation. Doklady Akademii Nauk SSSR, 194(4)","year":"1970","author":"Dinic E. A.","key":"e_1_3_2_1_8_1","unstructured":"E. A. Dinic . An algorithm for the solution of the max-flow problem with the polynomial estimation. Doklady Akademii Nauk SSSR, 194(4) , 1970 . E. A. Dinic. An algorithm for the solution of the max-flow problem with the polynomial estimation. Doklady Akademii Nauk SSSR, 194(4), 1970."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECT.2005.98"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_11_1","first-page":"399","volume":"8","author":"Ford L. R.","unstructured":"L. R. Ford and D. R. Fulkerson . Maximal flow through a network. In Canadian Journal of Mathematics , volume 8 , pages 399 -- 404 . L. R. Ford and D. R. Fulkerson. Maximal flow through a network. In Canadian Journal of Mathematics, volume 8, pages 399--404.","journal-title":"Maximal flow through a network. In Canadian Journal of Mathematics"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1781894.1781925"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/12130.12144"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/0109047"},{"volume-title":"Proceedings of the Parallel Object-Oriented Scientific Computing (POOSC)","year":"2005","author":"Gregor D.","key":"e_1_3_2_1_15_1","unstructured":"D. Gregor and A. Lumsdaine . The parallel BGL: A generic library for distributed graph computations . In Proceedings of the Parallel Object-Oriented Scientific Computing (POOSC) , 2005 . D. Gregor and A. Lumsdaine. The parallel BGL: A generic library for distributed graph computations. In Proceedings of the Parallel Object-Oriented Scientific Computing (POOSC), 2005."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871503"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879190"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772755"},{"volume-title":"Proceedings of the 7th Symposium on Networked Systems Design and Implementation (NSDI'10)","year":"2010","author":"Lesniewski-Laas C.","key":"e_1_3_2_1_20_1","unstructured":"C. Lesniewski-Laas and M. F. Kaashoek . Whanau: A Sybil-proof distributed hash table . In Proceedings of the 7th Symposium on Networked Systems Design and Implementation (NSDI'10) , 2010 . C. Lesniewski-Laas and M. F. Kaashoek. Whanau: A Sybil-proof distributed hash table. In Proceedings of the 7th Symposium on Networked Systems Design and Implementation (NSDI'10), 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807184"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397742"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"volume-title":"Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI'08)","year":"2008","author":"Mislove A.","key":"e_1_3_2_1_24_1","unstructured":"A. Mislove , A. Post , K. P. Gummadi , and P. Druschel . Ostra: Leveraging trust to thwart unwanted communication . In Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI'08) , 2008 . A. Mislove, A. Post, K. P. Gummadi, and P. Druschel. Ostra: Leveraging trust to thwart unwanted communication. In Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI'08), 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1076315"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879191"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018487"},{"volume-title":"Proceedings of the 20th USENIX conference on Security (SEC'11)","year":"2011","author":"Motoyama M.","key":"e_1_3_2_1_28_1","unstructured":"M. Motoyama , D. McCoy , K. Levchenko , S. Savage , and G. M. Voelker . Dirty jobs: The role of freelance labor in web service abuse . In Proceedings of the 20th USENIX conference on Security (SEC'11) , 2011 . M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. Dirty jobs: The role of freelance labor in web service abuse. In Proceedings of the 20th USENIX conference on Security (SEC'11), 2011."},{"volume-title":"Proceedings of the 8th Symposium on Networked Systems Design and Implementation (NSDI'11)","year":"2011","author":"Post A.","key":"e_1_3_2_1_29_1","unstructured":"A. Post , V. Shah , and A. Mislove . Bazaar: Strengthening user reputations in online marketplaces . In Proceedings of the 8th Symposium on Networked Systems Design and Implementation (NSDI'11) , 2011 . A. Post, V. Shah, and A. Mislove. Bazaar: Strengthening user reputations in online marketplaces. In Proceedings of the 8th Symposium on Networked Systems Design and Implementation (NSDI'11), 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833583"},{"volume-title":"Proceedings of the 6 th Workshop on the Economics of Networks, Systems and Computation (NetEcon'11)","year":"2011","author":"Seuken S.","key":"e_1_3_2_1_31_1","unstructured":"S. Seuken and D. C. Parkes . On the Sybil-proofness of accounting mechanisms . In Proceedings of the 6 th Workshop on the Economics of Networks, Systems and Computation (NetEcon'11) , 2011 . S. Seuken and D. C. Parkes. On the Sybil-proofness of accounting mechanisms. In Proceedings of the 6 th Workshop on the Economics of Networks, Systems and Computation (NetEcon'11), 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_3_2_1_33_1","unstructured":"D. Streitfeld. Ferreting out fake reviews online. http:\/\/nytimes.com\/2011\/08\/20\/technology\/finding-fake-reviews-online.html. D. Streitfeld. Ferreting out fake reviews online. http:\/\/nytimes.com\/2011\/08\/20\/technology\/finding-fake-reviews-online.html."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935171"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1558977.1558979"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52329"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/79173.79181"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2012.6151333"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851226"},{"volume-title":"Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI'06)","year":"2006","author":"Walsh K.","key":"e_1_3_2_1_41_1","unstructured":"K. Walsh and E. G. Sirer . Experience with a distributed object reputation system for peer-to-peer filesharing . In Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI'06) , 2006 . K. Walsh and E. G. Sirer. Experience with a distributed object reputation system for peer-to-peer filesharing. In Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI'06), 2006."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068841"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034575.2034593"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987510.1987521"}],"event":{"name":"EuroSys '12: Seventh EuroSys Conference 2012","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Bern Switzerland","acronym":"EuroSys '12"},"container-title":["Proceedings of the 7th ACM european conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2168836.2168867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T03:29:37Z","timestamp":1673494177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2168836.2168867"}},"subtitle":["scaling social network-based Sybil tolerance schemes"],"short-title":[],"issued":{"date-parts":[[2012,4,10]]},"references-count":45,"alternative-id":["10.1145\/2168836.2168867","10.1145\/2168836"],"URL":"https:\/\/doi.org\/10.1145\/2168836.2168867","relation":{},"subject":[],"published":{"date-parts":[[2012,4,10]]},"assertion":[{"value":"2012-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}