메뉴 건너뛰기




Volumn , Issue , 2009, Pages 279-288

A guided tour puzzle for denial of service prevention

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL POWER; COMPUTATIONAL RESOURCES; DEFENSE MECHANISM; DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; LARGE DISPARITY; MINIMUM INTERFERENCE; MULTIPLE SERVERS; TOUR GUIDE;

EID: 77950803546     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2009.33     Document Type: Conference Paper
Times cited : (29)

References (33)
  • 1
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • Santa Barbara, CA
    • C. Dwork and M. Naor, "Pricing via processing or combatting junk mail," in CRYPTO '92, Santa Barbara, CA, 1992, pp. 139-147.
    • (1992) CRYPTO '92 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 3
    • 25644445353 scopus 로고    scopus 로고
    • The design and implementation of network puzzles
    • Miami, FL
    • W. Feng, E. Kaiser, and A. Luu, "The design and implementation of network puzzles," in IEEE INFOCOM '05, vol.4, Miami, FL, 2005, pp. 2372-2382.
    • (2005) IEEE INFOCOM '05 , vol.4 , pp. 2372-2382
    • Feng, W.1    Kaiser, E.2    Luu, A.3
  • 7
    • 77950814194 scopus 로고    scopus 로고
    • Online. Available
    • "Fast sha-1 hash core for asic," Helion Technology Limited, 2005. [Online]. Available: http://www.heliontech.com/downloads/sha1-asic-fast- helioncore.pdf
    • (2005) Fast Sha-1 Hash Core for Asic
  • 8
    • 36949036429 scopus 로고    scopus 로고
    • Portcullis: Protecting connection setup from denial-of-capability attacks
    • Kyoto, Japan
    • B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y. Hu, "Portcullis: Protecting connection setup from denial-of-capability attacks," in ACM SIGCOMM '07, Kyoto, Japan, 2007, pp. 289-300.
    • (2007) ACM SIGCOMM '07 , pp. 289-300
    • Parno, B.1    Wendlandt, D.2    Shi, E.3    Perrig, A.4    Maggs, B.5    Hu, Y.6
  • 10
    • 0003629991 scopus 로고
    • National Institute of Standards and Technology (NIST) Std.
    • Secure Hash Standard, National Institute of Standards and Technology (NIST) Std., 1995.
    • (1995) Secure Hash Standard
  • 12
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol.13(7), pp. 422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 13
    • 77950838687 scopus 로고    scopus 로고
    • Planet-lab scalable sensing service
    • Online. Available
    • "Planet-lab scalable sensing service," Scalable Sensing Service. [Online]. Available: http://networking.hpl.hp.com/s-cube/
    • Scalable Sensing Service
  • 14
    • 77950820717 scopus 로고    scopus 로고
    • Online. Available
    • "About planet lab," Planet Lab. [Online]. Available: http://www.planet-lab.org/about
    • About Planet Lab
  • 15
    • 33750308365 scopus 로고    scopus 로고
    • A DoS-limiting network architecture
    • Philadelphia
    • X. Yang, D. Wetherall, and T. Anderson, "A DoS-limiting network architecture," in ACM SIGCOMM '05, Philadelphia, 2005, pp. 241-252.
    • (2005) ACM SIGCOMM '05 , pp. 241-252
    • Yang, X.1    Wetherall, D.2    Anderson, T.3
  • 20
    • 0033650584 scopus 로고    scopus 로고
    • Practical network support for IP traceback
    • Stockholm, Sweden
    • S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in ACM SIGCOMM '00, vol.30(4), Stockholm, Sweden, 2000, pp. 295-306.
    • (2000) ACM SIGCOMM '00 , vol.30 , Issue.4 , pp. 295-306
    • Savage, S.1    Wetherall, D.2    Karlin, A.3    Anderson, T.4
  • 22
    • 35248832207 scopus 로고    scopus 로고
    • A general attack model on hash-based client puzzles
    • Cirencester, UK
    • G. Price, "A general attack model on hash-based client puzzles," in 9th IMA Conference on Cryptography and Coding, vol.2898, Cirencester, UK, 2003, pp. 319-331.
    • (2003) 9th IMA Conference on Cryptography and Coding , vol.2898 , pp. 319-331
    • Price, G.1
  • 23
    • 14844300104 scopus 로고    scopus 로고
    • New client puzzle outsourcing techniques for dos resistance
    • B. Waters, A. Juels, J. A. Halderman, and E. W. Felten, "New client puzzle outsourcing techniques for dos resistance," in 11th ACM CCS, 2004, pp. 246-256.
    • (2004) 11th ACM CCS , pp. 246-256
    • Waters, B.1    Juels, A.2    Halderman, J.A.3    Felten, E.W.4
  • 31
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coefficients
    • A. K. Lenstra, H. W. Lenstra, and L. Lovász, "Factoring polynomials with rational coefficients," Mathematische Annalen, vol.261(4), pp. 515-534, 1982.
    • (1982) Mathematische Annalen , vol.261 , Issue.4 , pp. 515-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovász, L.3
  • 33
    • 35248835679 scopus 로고    scopus 로고
    • On memory-bound functions for fighting spam
    • C. Dwork, A. Goldberg, and M. Naor, "On memory-bound functions for fighting spam," in CRYPTO '03, 2003, pp. 426-444.
    • (2003) CRYPTO '03 , pp. 426-444
    • Dwork, C.1    Goldberg, A.2    Naor, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.