-
1
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
Santa Barbara, CA
-
C. Dwork and M. Naor, "Pricing via processing or combatting junk mail," in CRYPTO '92, Santa Barbara, CA, 1992, pp. 139-147.
-
(1992)
CRYPTO '92
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
2
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
A. Juels and J. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in the 1999 Network and Distributed System Security Symposium (NDSS '99), San Diego, CA, 1999, pp. 151-165.
-
The 1999 Network and Distributed System Security Symposium (NDSS '99), San Diego, CA, 1999
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
3
-
-
25644445353
-
The design and implementation of network puzzles
-
Miami, FL
-
W. Feng, E. Kaiser, and A. Luu, "The design and implementation of network puzzles," in IEEE INFOCOM '05, vol.4, Miami, FL, 2005, pp. 2372-2382.
-
(2005)
IEEE INFOCOM '05
, vol.4
, pp. 2372-2382
-
-
Feng, W.1
Kaiser, E.2
Luu, A.3
-
4
-
-
84949938425
-
DoS-resistant authentication with client puzzles
-
T. Aura, P. Nikander, and J. Leiwo, "DoS-resistant authentication with client puzzles," in 8th International Workshop on Security Protocols, vol.2133, 2000, pp. 170-181.
-
(2000)
8th International Workshop on Security Protocols
, vol.2133
, pp. 170-181
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
5
-
-
85084162892
-
Using client puzzles to protect TLS
-
D. Dean and A. Stubblefield, "Using client puzzles to protect TLS," in 10th USENIX Security Symposium, Washington DC, 2001, pp. 1-8.
-
10th USENIX Security Symposium, Washington DC, 2001
, pp. 1-8
-
-
Dean, D.1
Stubblefield, A.2
-
6
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auctions
-
X. Wang and M. K. Reiter, "Defending against denial-of-service attacks with puzzle auctions," in IEEE Symposium on Security and Privacy, Washington DC, 2003, pp. 78-92.
-
IEEE Symposium on Security and Privacy, Washington DC, 2003
, pp. 78-92
-
-
Wang, X.1
Reiter, M.K.2
-
7
-
-
77950814194
-
-
Online. Available
-
"Fast sha-1 hash core for asic," Helion Technology Limited, 2005. [Online]. Available: http://www.heliontech.com/downloads/sha1-asic-fast- helioncore.pdf
-
(2005)
Fast Sha-1 Hash Core for Asic
-
-
-
8
-
-
36949036429
-
Portcullis: Protecting connection setup from denial-of-capability attacks
-
Kyoto, Japan
-
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y. Hu, "Portcullis: Protecting connection setup from denial-of-capability attacks," in ACM SIGCOMM '07, Kyoto, Japan, 2007, pp. 289-300.
-
(2007)
ACM SIGCOMM '07
, pp. 289-300
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu, Y.6
-
9
-
-
38349080863
-
Toward non-parallelizable client puzzles
-
Singapore
-
S. Tritilanunt, C. Boyd, E. Foo, and J. M. González, "Toward non-parallelizable client puzzles," in 6h International Conference on Cryptology and Network Security, vol.4856, Singapore, 2007, pp. 247-264.
-
(2007)
6h International Conference on Cryptology and Network Security
, vol.4856
, pp. 247-264
-
-
Tritilanunt, S.1
Boyd, C.2
Foo, E.3
González, J.M.4
-
10
-
-
0003629991
-
-
National Institute of Standards and Technology (NIST) Std.
-
Secure Hash Standard, National Institute of Standards and Technology (NIST) Std., 1995.
-
(1995)
Secure Hash Standard
-
-
-
12
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol.13(7), pp. 422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
13
-
-
77950838687
-
Planet-lab scalable sensing service
-
Online. Available
-
"Planet-lab scalable sensing service," Scalable Sensing Service. [Online]. Available: http://networking.hpl.hp.com/s-cube/
-
Scalable Sensing Service
-
-
-
14
-
-
77950820717
-
-
Online. Available
-
"About planet lab," Planet Lab. [Online]. Available: http://www.planet-lab.org/about
-
About Planet Lab
-
-
-
15
-
-
33750308365
-
A DoS-limiting network architecture
-
Philadelphia
-
X. Yang, D. Wetherall, and T. Anderson, "A DoS-limiting network architecture," in ACM SIGCOMM '05, Philadelphia, 2005, pp. 241-252.
-
(2005)
ACM SIGCOMM '05
, pp. 241-252
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
-
16
-
-
3543097593
-
SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks
-
A. Yaar, A. Perrig, and D. Song, "SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks," in IEEE Symposium on Security and Privacy, 2004, pp. 130-143.
-
IEEE Symposium on Security and Privacy, 2004
, pp. 130-143
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
18
-
-
34250620174
-
Netbouncer: Client-legitimacy-based high-performance DDoS filtering
-
R. Thomas, B. Mark, T. Johnson, and J. Croall, "Netbouncer: Client-legitimacy-based high-performance DDoS filtering," in 3rd DARPA Information Survivability Conference and Exposition, 2003, pp. 14-25.
-
3rd DARPA Information Survivability Conference and Exposition, 2003
, pp. 14-25
-
-
Thomas, R.1
Mark, B.2
Johnson, T.3
Croall, J.4
-
20
-
-
0033650584
-
Practical network support for IP traceback
-
Stockholm, Sweden
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in ACM SIGCOMM '00, vol.30(4), Stockholm, Sweden, 2000, pp. 295-306.
-
(2000)
ACM SIGCOMM '00
, vol.30
, Issue.4
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
21
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling high bandwidth aggregates in the network," ACM Computer Communication Review, vol.32(3), pp. 62-73, 2002.
-
(2002)
ACM Computer Communication Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
22
-
-
35248832207
-
A general attack model on hash-based client puzzles
-
Cirencester, UK
-
G. Price, "A general attack model on hash-based client puzzles," in 9th IMA Conference on Cryptography and Coding, vol.2898, Cirencester, UK, 2003, pp. 319-331.
-
(2003)
9th IMA Conference on Cryptography and Coding
, vol.2898
, pp. 319-331
-
-
Price, G.1
-
23
-
-
14844300104
-
New client puzzle outsourcing techniques for dos resistance
-
B. Waters, A. Juels, J. A. Halderman, and E. W. Felten, "New client puzzle outsourcing techniques for dos resistance," in 11th ACM CCS, 2004, pp. 246-256.
-
(2004)
11th ACM CCS
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
-
24
-
-
14844334596
-
Mitigating bandwidth-exhaustion attacks using congestion puzzles
-
X. Wang and M. K. Reiter, "Mitigating bandwidth-exhaustion attacks using congestion puzzles," in 11th ACM Conference on Computer and Communications Security, Washington DC, 2004, pp. 257-267.
-
11th ACM Conference on Computer and Communications Security, Washington DC, 2004
, pp. 257-267
-
-
Wang, X.1
Reiter, M.K.2
-
26
-
-
0010602889
-
-
MIT, Cambridge, Massachusetts, Tech. Rep.
-
R. L. Rivest, A. Shamir, and D. A. Wagner, "Time-lock puzzles and timed-release crypto," MIT, Cambridge, Massachusetts, Tech. Rep., 1996.
-
(1996)
Time-lock puzzles and timed-release crypto
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
28
-
-
77950829270
-
On chained cryptographic puzzles
-
B. Groza and D. Petrica, "On chained cryptographic puzzles," in 3rd Romanian-Hungarian Joint Symposium on Applied Computational Intelligence (SACI '06), Timisoara, Romania, 2006.
-
3rd Romanian-Hungarian Joint Symposium on Applied Computational Intelligence (SACI '06), Timisoara, Romania, 2006
-
-
Groza, B.1
Petrica, D.2
-
29
-
-
0004116989
-
-
2nd ed. MIT Press and McGraw-Hill, ch. 35
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed. MIT Press and McGraw-Hill, 2001, ch. 35.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
30
-
-
0000951613
-
Improved low-density subset sum algorithms
-
M. J. Coster, A. Joux, B. A. Lamacchia, A. M. Odlyzko, C. Schnorr, and J. Stern, "Improved low-density subset sum algorithms," Computational Complexity, vol.2(2), 1992.
-
(1992)
Computational Complexity
, vol.2
, Issue.2
-
-
Coster, M.J.1
Joux, A.2
Lamacchia, B.A.3
Odlyzko, A.M.4
Schnorr, C.5
Stern, J.6
-
31
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
A. K. Lenstra, H. W. Lenstra, and L. Lovász, "Factoring polynomials with rational coefficients," Mathematische Annalen, vol.261(4), pp. 515-534, 1982.
-
(1982)
Mathematische Annalen
, vol.261
, Issue.4
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovász, L.3
-
32
-
-
85045893940
-
Moderately hard, memory-bound functions
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber, "Moderately hard, memory-bound functions," in 10th Annual Network and Distributed System Security Symposium (NDSS '03), San Diego, CA, 2003, pp. 25-39.
-
10th Annual Network and Distributed System Security Symposium (NDSS '03), San Diego, CA, 2003
, pp. 25-39
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
33
-
-
35248835679
-
On memory-bound functions for fighting spam
-
C. Dwork, A. Goldberg, and M. Naor, "On memory-bound functions for fighting spam," in CRYPTO '03, 2003, pp. 426-444.
-
(2003)
CRYPTO '03
, pp. 426-444
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
|