-
1
-
-
85045893940
-
Moderately hard, memory-bound functions
-
San Diego, California, USA. (February)
-
Abadi, M., Burrows, M., Manasse, M., Wobber, T.: Moderately hard, memory-bound functions. In: Proceedings of Network and Distributed Systems Security Symposium, San Diego, California, USA. (February 2003) 107-121
-
(2003)
Proceedings of Network and Distributed Systems Security Symposium
, pp. 107-121
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
3
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
February
-
Juels, A., Brainard, J.: Client puzzles: A cryptographic countermeasure against connection depletion attacks. In: Proceedings of Networks and Distributed Security Systems. (February 1999) 151-165
-
(1999)
Proceedings of Networks and Distributed Security Systems
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
6
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
Waters, B., Juels, A., Halderman, J.A., Felten, E.W.: New client puzzle outsourcing techniques for DoS resistance. In: Proceedings of the 11 th ACM conference on Computer and Communications Security. (2004) 246-256
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
-
8
-
-
0027647490
-
Random early detection gateways for congestion avoidance
-
Floyd, S., Jacobson, V.: Random early detection gateways for congestion avoidance. IEEE/ACM Transactions on Networking 1(4) (1993) 397-413
-
(1993)
IEEE/ACM Transactions on Networking
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Jacobson, V.2
-
12
-
-
84942868501
-
Experiments with automatically created memory-based heuristics
-
London, UK, Springer-Verlag
-
Hern'advolgyi, I.T., Holte, R.C.: Experiments with automatically created memory-based heuristics. In: Proceedings of the 4th International Symposium on Abstraction, Reformulation, and Approximation, London, UK, Springer-Verlag (2000) 281-290
-
(2000)
Proceedings of the 4th International Symposium on Abstraction, Reformulation, and Approximation
, pp. 281-290
-
-
Hern'advolgyi, I.T.1
Holte, R.C.2
-
13
-
-
33746639337
-
Threshold puzzles: The evolution of DoS-resistant authentication
-
Periodica Politechnica
-
Bocan, V.: Threshold puzzles: The evolution of DoS-resistant authentication. Periodica Politechnica, Transactions on Automatic Control and Computer Science 49(63) (2004)
-
(2004)
Transactions on Automatic Control and Computer Science
, vol.49
, Issue.63
-
-
Bocan, V.1
-
14
-
-
0017959977
-
Secure communications over insecure channels
-
April
-
Merkle, R.C.: Secure communications over insecure channels. Communications of ACM 21(4) (April 1978) 294-299
-
(1978)
Communications of ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.C.1
-
15
-
-
14844310899
-
Hash cash - A denial of service counter-measure
-
Back, A.: Hash cash - A Denial of Service Counter-Measure. Technical report (2002) http://www.hashcash.org/.
-
(2002)
Technical Report
-
-
Back, A.1
-
16
-
-
14844334596
-
Mitigating bandwidth-exhaustion attacks using congestion puzzles
-
New York, NY, USA, ACM Press
-
Wang, X., Reiter, M.K.: Mitigating bandwidth-exhaustion attacks using congestion puzzles. In: Proceedings of the 11th ACM conference on Computer and Communications Security, New York, NY, USA, ACM Press (2004) 257-267
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 257-267
-
-
Wang, X.1
Reiter, M.K.2
-
18
-
-
84899829959
-
A formal basis for the heuristic determination of minimum cost paths
-
Hart, P.E., Nilsson, N.J., Raphael, B.: A formal basis for the heuristic determination of minimum cost paths. IEEE Transactions on Systems Science and Cybernetics 4(2) (1968) 100-107
-
(1968)
IEEE Transactions on Systems Science and Cybernetics
, vol.4
, Issue.2
, pp. 100-107
-
-
Hart, P.E.1
Nilsson, N.J.2
Raphael, B.3
-
19
-
-
0001823557
-
Correction to a formal basis for the heuristic determination of minimum cost paths
-
Hart, P.E., Nilsson, N.J., Raphael, B.: Correction to a formal basis for the heuristic determination of minimum cost paths. ACM SIGART Bulletin (37) (1972) 28-29
-
(1972)
ACM SIGART Bulletin
, Issue.37
, pp. 28-29
-
-
Hart, P.E.1
Nilsson, N.J.2
Raphael, B.3
-
20
-
-
0005341896
-
A real-time algorithm for the (n2 - 1)-puzzle
-
Parberry, I.: A real-time algorithm for the (n2 - 1)-puzzle. Information Processing Letters 56(1) (1995) 23-28
-
(1995)
Information Processing Letters
, vol.56
, Issue.1
, pp. 23-28
-
-
Parberry, I.1
-
22
-
-
0032596409
-
A space-time tradeoff for memory-based heuristics
-
Menlo Park, CA, USA, American Association for Artificial Intelligence
-
Holte, R.C., Hern'advolgyi, I.T.: A space-time tradeoff for memory-based heuristics. In: Proceedings of the 16th national conference on Artificial Intelligence and the 11th Innovative Applications of Artificial Intelligence conference, Menlo Park, CA, USA, American Association for Artificial Intelligence (1999) 704-709
-
(1999)
Proceedings of the 16th National Conference on Artificial Intelligence and the 11th Innovative Applications of Artificial Intelligence Conference
, pp. 704-709
-
-
Holte, R.C.1
Hern'advolgyi, I.T.2
-
25
-
-
0031630984
-
Complexity analysis admissible heuristic search
-
Menlo Park, CA, USA, American Association for Artificial Intelligence
-
Korf, R.E., Reid, M.: Complexity analysis admissible heuristic search. In: Proceedings of the 15th national/10th conference on Artificial Intelligence/Innovative Applications of Artificial intelligence, Menlo Park, CA, USA, American Association for Artificial Intelligence (1998) 305-310
-
(1998)
Proceedings of the 15th National/10th Conference on Artificial Intelligence/Innovative Applications of Artificial Intelligence
, pp. 305-310
-
-
Korf, R.E.1
Reid, M.2
-
26
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4) (1986) 792-807
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
|