-
1
-
-
12244282921
-
CAPTCHA: Using hard AI problems for security
-
Warsaw, Poland, May
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using Hard AI Problems for Security," Advances in Cryptography - EUROCRYPT 2003, Warsaw, Poland, May 2003.
-
(2003)
Advances in Cryptography - EUROCRYPT 2003
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
2
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
Proc. of the 8th Int'l Security Protocols Workshop, Cambridge, U.K., April 2000, Springer Verlag
-
T. Aura, P. Nikander, and J. Leiwo, "DOS-Resistant Authentication with Client Puzzles," Proc. of the 8th Int'l Security Protocols Workshop, Cambridge, U.K., April 2000, LNCS vol. 2133, Springer Verlag, pp. 170-178.
-
LNCS
, vol.2133
, pp. 170-178
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
4
-
-
0003894633
-
-
ICS Press, San Francisco, (Part 2, describing case studies; cf. [17])
-
D.W. Bromley, Making the Commons Work: Theory, Practice and Policy, ICS Press, San Francisco, 1992 (Part 2, describing case studies; cf. [17], p.22, 272).
-
(1992)
Making the Commons Work: Theory, Practice and Policy
, pp. 22
-
-
Bromley, D.W.1
-
5
-
-
0003217168
-
Hot spares for DoS attacks
-
July
-
T. Darmohray and R. Oliver, "Hot Spares for DoS Attacks," ;login:, Vol. 25, No. 7, July 2000.
-
(2000)
Login
, vol.25
, Issue.7
-
-
Darmohray, T.1
Oliver, R.2
-
7
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
Proc. of Advances in Cryptography: CRYPTO '92, Springer Verlag
-
C. Dwork and M. Naor, "Pricing via Processing or Combatting Junk Mail," Proc. of Advances in Cryptography: CRYPTO '92, LNCS Vol. 740, Springer Verlag, 1992.
-
(1992)
LNCS
, vol.740
-
-
Dwork, C.1
Naor, M.2
-
10
-
-
0022614726
-
On denial of service in computer networks
-
Los Angeles, California, February
-
V.D. Gligor, "On Denial of Service in Computer Networks," Proc. of Int'l Conference on Data Engineering, Los Angeles, California, February 1986, pp. 608-617.
-
(1986)
Proc. of Int'l Conference on Data Engineering
, pp. 608-617
-
-
Gligor, V.D.1
-
11
-
-
84958968987
-
Fast encryption and authentication: XCBC encryption and XECB authentication modes
-
FSE 2001, M. Matsui (ed.), Yokohama, Japan, April
-
V.D. Gligor and P. Donescu, "Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes," 8th International Workshop on Fast Sofware Encryption, FSE 2001, M. Matsui (ed.), Yokohama, Japan, April 2001, pp. 92-108.
-
(2001)
8th International Workshop on Fast Sofware Encryption
, pp. 92-108
-
-
Gligor, V.D.1
Donescu, P.2
-
12
-
-
0025383763
-
A guided tour of chernoff bounds
-
North-Holland
-
T. Hagerup and C. Rub, "A Guided Tour of Chernoff Bounds," Information Processing Letters, vol. 33, 1989-90, North-Holland, pp. 305-308.
-
(1989)
Information Processing Letters
, vol.33
, pp. 305-308
-
-
Hagerup, T.1
Rub, C.2
-
13
-
-
0014413249
-
The tragedy of commons
-
G. Hardin, "The Tragedy of Commons," Science, vol 162, (1968): 1243.
-
(1968)
Science
, vol.162
, pp. 1243
-
-
Hardin, G.1
-
15
-
-
85180745018
-
Implementing pushback: Router-based defense against DDoS attacks
-
San Diego, California, Feb.
-
J. Ioannidis and S. Bellovin, "Implementing Pushback: Router-Based Defense Against DDoS Attacks," Proc. of Network and Distributed Systems Security Symposium," San Diego, California, Feb. 2002, pp. 79-86.
-
(2002)
Proc. of Network and Distributed Systems Security Symposium
, pp. 79-86
-
-
Ioannidis, J.1
Bellovin, S.2
-
16
-
-
84861587712
-
Client puzzles: A cryptographic defense against connection depletion attacks
-
San Diego, CA, Feb.
-
A. Juels and J. Brainard, "Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks," in Proc. of Network and Distributed Systems Symposium, San Diego, CA, Feb. 1999.
-
(1999)
Proc. of Network and Distributed Systems Symposium
-
-
Juels, A.1
Brainard, J.2
-
17
-
-
33645696082
-
Software components: Only giants survive
-
A. Herbert and K. Sparck Jones (eds.), Microsoft Research, February
-
B. Lampson, "Software Components: Only Giants Survive," in Computer Systems: Papers for Roger Needham, A. Herbert and K. Sparck Jones (eds.), Microsoft Research, February 2003, pp. 113-120.
-
(2003)
Computer Systems: Papers for Roger Needham
, pp. 113-120
-
-
Lampson, B.1
-
21
-
-
85084161486
-
Inferring internet denial of service activity
-
Washington D.C, August
-
D. Moore, G. Voelker, and S. Savage, "Inferring Internet Denial of Service Activity," Proc. of 2001 USENIX Security Symposium, Washington D.C, August 2001.
-
(2001)
Proc. of 2001 USENIX Security Symposium
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
22
-
-
1142270162
-
-
S. Pearson, B. Balacheff, L. Chen, D Palquin, G. Proudler (eds.), Prentice Hall PTR
-
Trusted Computing Platforms - TCPA Technology in Context, S. Pearson, B. Balacheff, L. Chen, D Palquin, G. Proudler (eds.), Prentice Hall PTR, 2003.
-
(2003)
Trusted Computing Platforms - TCPA Technology in Context
-
-
-
24
-
-
1242263213
-
The effectiveness of request redirection on CDN robustness
-
Boston, Mass. December
-
L. Wang, V. Pai, and L. Petersen, "The Effectiveness of Request Redirection on CDN Robustness," Proc. of the 5th Symp. on OS Design and Implementation (OSDI), Boston, Mass. December 2002.
-
(2002)
Proc. of the 5th Symp. on OS Design and Implementation (OSDI)
-
-
Wang, L.1
Pai, V.2
Petersen, L.3
-
25
-
-
84954449334
-
Defending against denial-of-service attacks with puzzle auctions
-
Berkeley, CA, May
-
X. Wang and M. Reiter, "Defending Against Denial-of-Service Attacks with Puzzle Auctions," Proc. of IEEE Symp. on Security and Privacy, Berkeley, CA, May 2003.
-
(2003)
Proc. of IEEE Symp. on Security and Privacy
-
-
Wang, X.1
Reiter, M.2
-
26
-
-
2342665173
-
Hello, are you human
-
Georgia Institute of Technology, November
-
J. Xu, R. Lipton, and I. Essa, "Hello, Are You Human," Technical Report, Georgia Institute of Technology, November 2000.
-
(2000)
Technical Report
-
-
Xu, J.1
Lipton, R.2
Essa, I.3
-
27
-
-
0023829320
-
A formal specification and verification method for preventing denial of service attacks
-
Oakland, CA., April
-
C.-F. Yu and V.D. Gligor, "A Formal Specification and Verification Method for Preventing Denial of Service Attacks," Proc. of the IEEE Security and Privacy Symposium, Oakland, CA., April 1988, pp. 187-2002
-
(1988)
Proc. of the IEEE Security and Privacy Symposium
, pp. 187-2002
-
-
Yu, C.-F.1
Gligor, V.D.2
|