-
1
-
-
85045893940
-
Moderately hard, memory-bound functions
-
Internet Society
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In NDSS '03, pages 107-121. Internet Society, 2003.
-
(2003)
NDSS '03
, pp. 107-121
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
3
-
-
0036036842
-
Tradeoffs in probabilistic packet marking for IP traceback
-
ACM Press
-
M. Adler. Tradeoffs in probabilistic packet marking for IP traceback. In STOC '02, pages 407-418. ACM Press, 2002.
-
(2002)
STOC '02
, pp. 407-418
-
-
Adler, M.1
-
5
-
-
3543121457
-
Preventing Internet denial-of-service with capabilities
-
ACM Press
-
T. Anderson, T. Roscoe, and D. Wetherall. Preventing Internet denial-of-service with capabilities. In HotNets-II. ACM Press, 2003.
-
(2003)
HotNets-II
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
7
-
-
14844310899
-
-
Original system developed in 1997. Manuscript. Referenced 2004
-
A. Back. Hashcash - a denial-of-service countermeasure, 2002. Original system developed in 1997. Manuscript. Referenced 2004 at http://www.hashcash. org/hashcash.pdf.
-
(2002)
Hashcash - A Denial-of-service Countermeasure
-
-
Back, A.1
-
10
-
-
0037623983
-
Identity based encryption from the weil pairing
-
D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. SIAM J. of Computing, 32(3):586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
85025403958
-
An algebraic approach to IP traceback
-
D. Dean, M. Franklin, and A. Stubblefield. An algebraic approach to IP traceback. Information and System Security, 5(2):99-137, 2002.
-
(2002)
Information and System Security
, vol.5
, Issue.2
, pp. 99-137
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
15
-
-
35248835679
-
On memory-bound functions for fighting spam
-
D. Boneh, editor. Springer-Verlag
-
C. Dwork, A. Goldberg, and M. Naor. On memory-bound functions for fighting spam. In D. Boneh, editor, CRYPTO '03, pages 426-444. Springer-Verlag, 2003.
-
(2003)
CRYPTO '03
, pp. 426-444
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
-
16
-
-
0001126172
-
Pricing via processing or combatting junk mail
-
Ernest F. Brickell, editor. Springer-Verlag
-
C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Ernest F. Brickell, editor, CRYPTO '92, pages 139-147. Springer-Verlag, 1992.
-
(1992)
CRYPTO '92
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
17
-
-
3142747919
-
Auditable metering with lightweight security
-
R. Hirschfeld, editor. Springer-Verlag
-
M.K. Franklin and D. Malkhi. Auditable metering with lightweight security. In R. Hirschfeld, editor, Financial Cryptography '97, pages 151-160. Springer-Verlag, 1997.
-
(1997)
Financial Cryptography '97
, pp. 151-160
-
-
Franklin, M.K.1
Malkhi, D.2
-
18
-
-
0042254288
-
Curbing junk e-mail via secure classification
-
R. Hirschfeld, editor. Springer-Verlag
-
E. Gabber, M. Jakobsson, Y. Matias, and A. Mayer. Curbing junk e-mail via secure classification. In R. Hirschfeld, editor, Financial Cryptography '98. Springer-Verlag, 1998.
-
(1998)
Financial Cryptography '98
-
-
Gabber, E.1
Jakobsson, M.2
Matias, Y.3
Mayer, A.4
-
19
-
-
14844282689
-
Guaranteeing access in spite of service-flooding attacks
-
Virgil D. Gligor. Guaranteeing access in spite of service-flooding attacks. In Security Protocols Workshop, 2003.
-
(2003)
Security Protocols Workshop
-
-
Gligor, V.D.1
-
20
-
-
3042593993
-
Publicly verifiable lotteries: Applications of delaying functions
-
R. Hirschfeld, editor. Springer-Verlag
-
D. Goldschlag and S. Stubblebine. Publicly verifiable lotteries: Applications of delaying functions. In R. Hirschfeld, editor, Financial Cryptography '98. Springer-Verlag, 1998.
-
(1998)
Financial Cryptography '98
-
-
Goldschlag, D.1
Stubblebine, S.2
-
25
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S.M. Bellovin, S. Floyd, J. Ioannidis, V. Paxons, and S. Shenker. Controlling high bandwidth aggregates in the network. ACM Computer Communication Review, 32(3):62-73, 2002.
-
(2002)
ACM Computer Communication Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxons, V.5
Shenker, S.6
-
26
-
-
0017959977
-
Secure communications over insecure channels
-
April
-
R. Merkle. Secure communications over insecure channels. Communications of the ACM, 21(8):294-299, April 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.8
, pp. 294-299
-
-
Merkle, R.1
-
27
-
-
84860093441
-
-
The Netfilter/Iptables Project. Web site at http://www.netfilter.org.
-
-
-
-
28
-
-
84860093439
-
-
The GNU MP Project. Web site at http://www.gnu.org/software/gmp/gmp.html.
-
-
-
-
29
-
-
0010602889
-
Time-lock puzzles and timed-release crypto
-
MIT
-
R.L. Rivest, A. Shamir, and D. Wagner. Time-lock puzzles and timed-release crypto. Technical Report MIT/LCS/TR-684, MIT, 1996.
-
(1996)
Technical Report
, vol.MIT-LCS-TR-684
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.3
-
30
-
-
0033650584
-
Practical network support for IP traceback
-
S Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In ACM SIGCOMM 2000, pages 295-306, 2000.
-
(2000)
ACM SIGCOMM 2000
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
31
-
-
0040935952
-
Security of discrete log cryptosystems in the random oracle and generic model
-
The Fields Institute
-
C.-P. Schnorr and M. Jakobsson. Security of discrete log cryptosystems in the random oracle and generic model. In The Mathematics of Public-Key Cryptography. The Fields Institute, 1999.
-
(1999)
The Mathematics of Public-Key Cryptography
-
-
Schnorr, C.-P.1
Jakobsson, M.2
-
33
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. X. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. In IEEE INFOCOM, pages 878-886, 2001.
-
(2001)
IEEE INFOCOM
, pp. 878-886
-
-
Song, D.X.1
Perrig, A.2
-
34
-
-
85084163540
-
Centertrack: An IP overlay network for tracking DoS floods
-
R. Stone. CenterTrack: An IP overlay network for tracking DoS floods. In USENIX Security '00, 2000.
-
(2000)
USENIX Security '00
-
-
Stone, R.1
-
35
-
-
35248831179
-
Captcha: Using hard AI problems for security
-
E. Biham, editor. Springer-Verlag
-
L. von Ahn, M. Blum, N.J. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In E. Biham, editor, Eurocrypt '03, pages 294-311. Springer-Verlag, 2003.
-
(2003)
Eurocrypt '03
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
36
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auctions
-
X. Wang and M. K. Reiter. Defending against denial-of-service attacks with puzzle auctions. In IEEE Symposium on Security and Privacy, pages 78-92, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 78-92
-
-
Wang, X.1
Reiter, M.K.2
|