-
1
-
-
21644461880
-
Moderately hard, memory-bound functions
-
May
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. ACM Transactions on Internet Technology, 5(2):299-327, May 2005.
-
(2005)
ACM Transactions on Internet Technology
, vol.5
, Issue.2
, pp. 299-327
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
2
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
Washington, USA, November, ACM
-
E. Damiani, S. D. Capitani, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 207-216, Washington, USA, November 2002. ACM.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
Capitani, S.D.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
3
-
-
14844325772
-
Pong-cache poisoning in guess
-
Washington, USA, October, ACM
-
N. Daswani and H. Garcia-Molina. Pong-cache poisoning in guess. In Proceedings of the 11th ACM conference on Computer and communications security, pages 98-109, Washington, USA, October 2004. ACM.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 98-109
-
-
Daswani, N.1
Garcia-Molina, H.2
-
6
-
-
84861587712
-
Client puzzles: A cryptographic defense against connection depletion attacks
-
California, USA, February
-
A. Juels and J. Brainard. Client puzzles: A cryptographic defense against connection depletion attacks. In Proceedings of the Networks and Distributed Security Systems, pages 151-165, California, USA, February 1999.
-
(1999)
Proceedings of the Networks and Distributed Security Systems
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
7
-
-
84976699318
-
The byzantine general problem
-
July
-
L. Lamport, R. Shostak, and M. Pease. The byzantine general problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
8
-
-
77951436121
-
Impeding attrition attacks in p2p systems
-
Leuven, Belgium, September, ACM
-
P. Maniatis, T. Giuli, M. Roussopoulos, D. Rosenthal, and M. Baker. Impeding attrition attacks in p2p systems. In Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, September 2004. ACM.
-
(2004)
Proceedings of the 11th ACM SIGOPS European Workshop
-
-
Maniatis, P.1
Giuli, T.2
Roussopoulos, M.3
Rosenthal, D.4
Baker, M.5
-
9
-
-
84949199141
-
Mitigating distributed denial of service attacks with dynamic resource pricing
-
June
-
D. Mankins, R. Krishnan, C. Boyd, J. Zao, and M. Frentz. Mitigating distributed denial of service attacks with dynamic resource pricing. In Proceedings of the 17th Annual conference on Computer Security Applications, June 2001.
-
(2001)
Proceedings of the 17th Annual Conference on Computer Security Applications
-
-
Mankins, D.1
Krishnan, R.2
Boyd, C.3
Zao, J.4
Frentz, M.5
-
11
-
-
21644482433
-
Economic measures to resist attacks on a peer-to-peer network
-
Berkeley, USA, June
-
D. Rosenthal, M. Roussopoulos, P. Maniatis, and M. Baker. Economic measures to resist attacks on a peer-to-peer network. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems, Berkeley, USA, June 2003.
-
(2003)
Proceedings of the Workshop on Economics of Peer-to-Peer Systems
-
-
Rosenthal, D.1
Roussopoulos, M.2
Maniatis, P.3
Baker, M.4
|