-
1
-
-
85045893940
-
Moderately hard, memory-bound functions
-
M. Abadi, M. Burrow, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, 2003.
-
Proceedings of the 10th Annual Network and Distributed System Security Symposium, 2003
-
-
Abadi, M.1
Burrow, M.2
Manasse, M.3
Wobber, T.4
-
4
-
-
0038650772
-
Defending against sequence number attacks
-
May
-
S. Bellovin. Defending against sequence number attacks. In RFC 1948, May, 1996.
-
(1996)
RFC 1948
-
-
Bellovin, S.1
-
6
-
-
0037636199
-
Computer emergency response team, CERT advisory ca-2001-01: Denial-of-service developments
-
CERT
-
CERT. Computer emergency response team, CERT advisory ca-2001-01: Denial-of-service developments. In http://staff.washington.edu/dittrich/misc/ddos, 2000.
-
(2000)
-
-
-
7
-
-
4143130116
-
Denial of service attacks
-
CERT; June 4
-
CERT. Denial of service attacks. In http://www.cert.org/tech_tips/denial_of_service.html, June 4 2001.
-
(2001)
-
-
-
8
-
-
84871109649
-
Advisory ca-96.21: Tcp syn flooding and IP spoofing attacks
-
CERT; September 24
-
CERT. Advisory ca-96.21: Tcp syn flooding and IP spoofing attacks. September 24 1996.
-
(1996)
-
-
-
11
-
-
25344461816
-
Distributed denial of service (ddos) attacks/tools resource page
-
D. Dittrich. Distributed denial of service (ddos) attacks/tools resource page. In http://staff.washington.edu/dittrich/misc/ddos, 2000.
-
(2000)
-
-
Dittrich, D.1
-
12
-
-
84943235829
-
Pricing via processing or combating junk mail
-
In E. Brickell, editor; Springer-Verlag
-
C. Dwork and M. Naor. Pricing via processing or combating junk mail. In E. Brickell, editor, Proceedings of Advances in Cryptology-Crypto 92, volume 1328 of Lecture Notes in Computer Science, pages 139-147. Springer-Verlag, 1992.
-
(1992)
Proceedings of Advances in Cryptology-Crypto 92, Volume 1328 of Lecture Notes in Computer Science
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
15
-
-
0034229418
-
Defeating distributed denial of service attacks
-
July-August
-
X. Geng and A. Whinston. Defeating distributed denial of service attacks. IEEE IT Professional, 2(4):36-41, July-August 2000.
-
(2000)
IEEE IT Professional
, vol.2
, Issue.4
, pp. 36-41
-
-
Geng, X.1
Whinston, A.2
-
17
-
-
0003976889
-
Trends in denial of service attack technology
-
October
-
K. Houle, G. Weaver, N. Long, and R. Thomas. Trends in denial of service attack technology. In http://www.cert.org/archive/pdf/DoS_trends.pdf, October 2001.
-
(2001)
-
-
Houle, K.1
Weaver, G.2
Long, N.3
Thomas, R.4
-
18
-
-
84861587712
-
Client puzzle: A cryptographic defense against connection depletion attacks
-
In S. Kent, editor
-
A. Juels and J. Brainard. Client puzzle: A cryptographic defense against connection depletion attacks. In S. Kent, editor, Proceedings of NDSS'99, pages 151-165, 1999.
-
(1999)
Proceedings of NDSS'99
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
20
-
-
0017959977
-
Secure communications over insecure channels
-
April
-
R. C. Merkle. Secure communications over insecure channels. 21:294-299, April 1978.
-
(1978)
, vol.21
, pp. 294-299
-
-
Merkle, R.C.1
-
22
-
-
0010602889
-
Time-lock puzzles and timed-release crypto
-
10 March
-
R. L. Rivest, A. Shamir, and D. Wagner. Time-lock puzzles and timed-release crypto. 10 March 1996.
-
(1996)
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.3
|