-
1
-
-
21644461880
-
Moderately hard, memory-bound functions
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. ACM Trans. on Internet Technology, Vol. 5, Issue 2, 2005, pp. 299-327
-
(2005)
ACM Trans. on Internet Technology
, vol.5
, Issue.2
, pp. 299-327
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
3
-
-
3543121457
-
Preventing Internet denial-of-service with capabilities
-
Cambridge, MA, Nov
-
T. Anderson, T. Roscoe, and D. Wetherall. Preventing Internet denial-of-service with capabilities. In Proc. of Hotnets-II, Cambridge, MA, Nov. 2003
-
(2003)
Proc. of Hotnets-II
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
5
-
-
35248835679
-
-
C. Dwork, A. Goldberg, and M. Naor. On memory-bound functions for fighting spam. In Advances in Cryptology - CRYPTO 2003. LNCS 2729, pp.426-444
-
C. Dwork, A. Goldberg, and M. Naor. On memory-bound functions for fighting spam. In Advances in Cryptology - CRYPTO 2003. LNCS 2729, pp.426-444
-
-
-
-
7
-
-
3543119176
-
Guaranteeing access in spite of distributed service-flooding attacks
-
April
-
V. D. Gligor. Guaranteeing access in spite of distributed service-flooding attacks, in Proceedings of the Security Protocols Workshop, April 2003
-
(2003)
Proceedings of the Security Protocols Workshop
-
-
Gligor, V.D.1
-
12
-
-
0742269306
-
SOS: An architecture for mitigating DDoS attacks
-
A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: An architecture for mitigating DDoS attacks. Journal on Selected Areas in Communications, 21(1):176-188, 2004
-
(2004)
Journal on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 176-188
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
14
-
-
84949199141
-
Mitigating distributed denial of service attacks with dynamic resource pricing
-
Dec
-
D. Mankins, R. Krishnan, C. Boyd, J. Zao, and M. Frentz. Mitigating distributed denial of service attacks with dynamic resource pricing. Proc. IEEE Annual Computer Security Applications Conference, Dec. 2001.
-
(2001)
Proc. IEEE Annual Computer Security Applications Conference
-
-
Mankins, D.1
Krishnan, R.2
Boyd, C.3
Zao, J.4
Frentz, M.5
-
16
-
-
18744376590
-
Using Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers
-
CCS, pp
-
W. Morein and A. Stavrou and D. Cook and A. Keromytis and V. Misra and D. Rubenstein, Using Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers, Proc. of the 10th ACM Intl. Conf. on Computer and Comm. Security (CCS), pp. 8-19, 2003
-
(2003)
Proc. of the 10th ACM Intl. Conf. on Computer and Comm. Security
, pp. 8-19
-
-
Morein, W.1
Stavrou, A.2
Cook, D.3
Keromytis, A.4
Misra, V.5
Rubenstein, D.6
-
17
-
-
38949108959
-
A Proposed Approach
-
Preventing Service Oriented Denial of Service PreSODoS
-
S. Padmanabhuni, V. Singh, K. M. S. Kumar, and A. Chatterjee, Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach, Proc. of the IEEE Intl. Conference on Web Services (ICWS'06), pp577-584, 2006
-
(2006)
Proc. of the IEEE Intl. Conference on Web Services (ICWS'06)
, pp. 577-584
-
-
Padmanabhuni, S.1
Singh, V.2
Kumar, K.M.S.3
Chatterjee, A.4
-
22
-
-
0036947597
-
Single-packet IP traceback
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B.Schwartz, S. T. Kent and W. T. Strayer, Single-packet IP traceback, IEEE/ACM Transactions on Networking (TON) Volume 10, Issue 6, 2002, pp. 721-734
-
(2002)
IEEE/ACM Transactions on Networking (TON)
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
23
-
-
2942728016
-
Telling humans and computers apart automatically
-
Feb
-
L. von Ahn, M. Blum, and J. Langford. Telling humans and computers apart automatically. CACM, 47(2), Feb. 2004.
-
(2004)
CACM
, vol.47
, Issue.2
-
-
von Ahn, L.1
Blum, M.2
Langford, J.3
|