메뉴 건너뛰기




Volumn 2898, Issue , 2003, Pages 319-331

A general attack model on hash-based client puzzles

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 35248832207     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40974-8_26     Document Type: Article
Times cited : (5)

References (11)
  • 2
    • 84949938425 scopus 로고    scopus 로고
    • DOS-resistant authentication with client puzzles
    • Proceedings of the 8th International Workshop on Security Protocols, April
    • Tuomas Aura, Pekka Nikander, and Jussipekka Leiwo. DOS-resistant authentication with client puzzles. In Proceedings of the 8th International Workshop on Security Protocols, volume 2133 of Lecture Notes in Computer Science, pages 170-177, April 2000.
    • (2000) Lecture Notes in Computer Science , vol.2133 , pp. 170-177
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 4
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • E. Birckell, editor, Proceedings of Advances in Oryptology - CRYPTO 92
    • C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In E. Birckell, editor, Proceedings of Advances in Oryptology - CRYPTO 92, volume 1328 of Lecture Notes in Computer Science, pages 139-147, 1992.
    • (1992) Lecture Notes in Computer Science , vol.1328 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 7
    • 0034229418 scopus 로고    scopus 로고
    • Defeating distributed denial of service attacks
    • July-August
    • X. Geng and A. Whinston. Defeating distributed denial of service attacks. IEEE IT Professional, 2(4):36-41, July-August 2000.
    • (2000) IEEE IT Professional , vol.2 , Issue.4 , pp. 36-41
    • Geng, X.1    Whinston, A.2
  • 9
    • 84956985093 scopus 로고    scopus 로고
    • Protocol interactions and the chosen protocol attack
    • B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors, Security Protocols 1997, April
    • J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors, Security Protocols 1997, volume 1361 of Lecture Notes in Computer Science, pages 91-104, April 1997.
    • (1997) Lecture Notes in Computer Science , vol.1361 , pp. 91-104
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 10
    • 35248839320 scopus 로고    scopus 로고
    • Sobig.F worm believed to start at Web porn site August
    • Sobig.F worm believed to start at Web porn site. Available at http://www.usatoday.com/tech/news/computersecurity/2003-08- 22 -sobig-start_x.htm, August 2003.
    • (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.