Report copyright - Sybil Defenses in Mobile Social Networks · Overview Most distributed systems are vulnerable to Sybil attacks. In this paper, we consider the Sybil attacks in a mobile social network
Please pass captcha verification before submit form