-
1
-
-
85045893940
-
Moderately hard, memory-bound functions
-
February
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In Proceedings of ISOC NDSS, February 2003.
-
(2003)
Proceedings of ISOC NDSS
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
7
-
-
84858487728
-
-
CAIDA
-
CAIDA. Skitter, http: //www.caida.org/tools/measurement/skitter/.
-
Skitter
-
-
-
8
-
-
84858485853
-
-
Clayton, Accessed May, 2007
-
Richard Clayton, http://www.cl.cam.ac.uk/~rncl/ Accessed May, 2007.
-
-
-
Richard1
-
12
-
-
0001126172
-
Pricing via processing or combatting junk mail
-
C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Proceedings of CRYPTO, 1993.
-
(1993)
Proceedings of CRYPTO
-
-
Dwork, C.1
Naor, M.2
-
15
-
-
51349165211
-
-
Cambridge, England. Available at, November
-
Helion Technology Limited. Fast SHA-1 hash core for ASIC. Cambridge, England. Available at http://www.heliontech.com/downloads/ shal_asic_fast_helioncore.pdf. November 2005.
-
(2005)
Helion Technology Limited. Fast SHA-1 hash core for ASIC
-
-
-
17
-
-
0002459783
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of ISOC NDSS, 1999.
-
(1999)
Proceedings of ISOC NDSS
-
-
Juels, A.1
Brainard, J.2
-
18
-
-
0036805563
-
DNS performance and the effectiveness of caching
-
Jaeyeon Jung, Emil Sit, Hari Balakrishnan, and Robert Morris. DNS performance and the effectiveness of caching. Transactions on Networking, 10(5), 2002.
-
(2002)
Transactions on Networking
, vol.10
, Issue.5
-
-
Jung, J.1
Sit, E.2
Balakrishnan, H.3
Morris, R.4
-
19
-
-
36949021939
-
-
National Institute of Standards and Technology (NIST) Computer Systems Laboratory. Secure hash standard. 180-1, April 1995.
-
National Institute of Standards and Technology (NIST) Computer Systems Laboratory. Secure hash standard. 180-1, April 1995.
-
-
-
-
23
-
-
14944380908
-
Availability, usage, and deployment characteristics of the domain name system
-
October
-
Jeffrey Pang, James Hendricks, Aditya Akella, Bruce Maggs, Roberto De Prisco, and Srinivasan Seshan. Availability, usage, and deployment characteristics of the domain name system. In Proceedings of the Internet Measurement Conference, October 2004.
-
(2004)
Proceedings of the Internet Measurement Conference
-
-
Pang, J.1
Hendricks, J.2
Akella, A.3
Maggs, B.4
Prisco, R.D.5
Seshan, S.6
-
24
-
-
36949017412
-
ConfiDNS: Leveraging scale and history to improve DNS security
-
November
-
Lindsey Poole and Vivek S. Pai. ConfiDNS: Leveraging scale and history to improve DNS security. In Proceedings of USENIX WORLDS, November 2006.
-
(2006)
Proceedings of USENIX WORLDS
-
-
Poole, L.1
Pai, V.S.2
-
25
-
-
36949037232
-
FANFARE for the common flow
-
Technical Report CMU-CS-05-148, Carnegie Mellon, February
-
Elaine Shi, Bryan Parno, Adrian Perrig, Yih-Chun Hu, and Bruce Maggs. FANFARE for the common flow. Technical Report CMU-CS-05-148, Carnegie Mellon, February 2005.
-
(2005)
-
-
Shi, E.1
Parno, B.2
Perrig, A.3
Hu, Y.4
Maggs, B.5
-
26
-
-
36349011617
-
DDoS defense by offense
-
September
-
Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker. DDoS defense by offense. In Proceedings of ACM SIGCOMM, September 2006.
-
(2006)
Proceedings of ACM SIGCOMM
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
28
-
-
14844334596
-
Mitigating bandwidth-exhaustion attacks using congestion puzzles
-
October
-
X. Wang and M. Reiter. Mitigating bandwidth-exhaustion attacks using congestion puzzles. In ACM CCS, October 2004.
-
(2004)
ACM CCS
-
-
Wang, X.1
Reiter, M.2
|