1. Back A (2002) Hashcash—a denial of service countermeasure. http://www.hashcash.org/hashcash.pdf
2. Bhattacharjee R, Goel A (2005) Avoiding ballot stuffing in ebay-like reputation systems. In: P2PECON ’05: proceedings of the 2005 ACM SIGCOMM workshop on economics of peer-to-peer systems
3. BitTorrent. http://bitconjurer.org/BitTorrent/ . Accessed March 2009
4. Borisov N (2006) Computational puzzles as sybil defenses. In: P2P ’06: proceedings of the sixth IEEE international conference on peer-to-peer computing
5. B. S. J, Janakiram D (2009) Symon: defending against sybil attack in large structured p2p systems. In: P2P’09: proceedings of the 9th international conference on peer-to-peer computing, pp 21–30