메뉴 건너뛰기




Volumn 3989 LNCS, Issue , 2006, Pages 98-113

Efficient memory bound puzzles using pattern databases

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CACHE MEMORY; COMPUTER CRIME; CONSTRAINT THEORY; HEURISTIC METHODS; PROGRAM PROCESSORS;

EID: 33746586067     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11767480_7     Document Type: Conference Paper
Times cited : (16)

References (26)
  • 3
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • February
    • Juels, A., Brainard, J.: Client puzzles: A cryptographic countermeasure against connection depletion attacks. In: Proceedings of Networks and Distributed Security Systems. (February 1999) 151-165
    • (1999) Proceedings of Networks and Distributed Security Systems , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 8
    • 0027647490 scopus 로고
    • Random early detection gateways for congestion avoidance
    • Floyd, S., Jacobson, V.: Random early detection gateways for congestion avoidance. IEEE/ACM Transactions on Networking 1(4) (1993) 397-413
    • (1993) IEEE/ACM Transactions on Networking , vol.1 , Issue.4 , pp. 397-413
    • Floyd, S.1    Jacobson, V.2
  • 13
    • 33746639337 scopus 로고    scopus 로고
    • Threshold puzzles: The evolution of DoS-resistant authentication
    • Periodica Politechnica
    • Bocan, V.: Threshold puzzles: The evolution of DoS-resistant authentication. Periodica Politechnica, Transactions on Automatic Control and Computer Science 49(63) (2004)
    • (2004) Transactions on Automatic Control and Computer Science , vol.49 , Issue.63
    • Bocan, V.1
  • 14
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • April
    • Merkle, R.C.: Secure communications over insecure channels. Communications of ACM 21(4) (April 1978) 294-299
    • (1978) Communications of ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.C.1
  • 15
    • 14844310899 scopus 로고    scopus 로고
    • Hash cash - A denial of service counter-measure
    • Back, A.: Hash cash - A Denial of Service Counter-Measure. Technical report (2002) http://www.hashcash.org/.
    • (2002) Technical Report
    • Back, A.1
  • 19
    • 0001823557 scopus 로고
    • Correction to a formal basis for the heuristic determination of minimum cost paths
    • Hart, P.E., Nilsson, N.J., Raphael, B.: Correction to a formal basis for the heuristic determination of minimum cost paths. ACM SIGART Bulletin (37) (1972) 28-29
    • (1972) ACM SIGART Bulletin , Issue.37 , pp. 28-29
    • Hart, P.E.1    Nilsson, N.J.2    Raphael, B.3
  • 20
    • 0005341896 scopus 로고
    • A real-time algorithm for the (n2 - 1)-puzzle
    • Parberry, I.: A real-time algorithm for the (n2 - 1)-puzzle. Information Processing Letters 56(1) (1995) 23-28
    • (1995) Information Processing Letters , vol.56 , Issue.1 , pp. 23-28
    • Parberry, I.1
  • 26
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4) (1986) 792-807
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.