-
1
-
-
84949938425
-
DOS-Resistant Authentication with Client Puzzles
-
Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. Springer, Heidelberg
-
Aura, T., Nikander, P., Leiwo, J.: DOS-Resistant Authentication with Client Puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170-177. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2133
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
3
-
-
0242585280
-
Improving the efficiency and reliability of digital time-stamping
-
Bayer, D., Haber, S.A., Stornetta, W.S.: Improving the efficiency and reliability of digital time-stamping. In: Sequences (1991)
-
(1991)
Sequences
-
-
Bayer, D.1
Haber, S.A.2
Stornetta, W.S.3
-
5
-
-
85012908743
-
One-Way Accumulators: A Decentralized Alternative to Digital Signatures
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Benaloh, J.C., de Mare, M.: One-Way Accumulators: A Decentralized Alternative to Digital Signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274-285. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 274-285
-
-
Benaloh, J.C.1
De Mare, M.2
-
6
-
-
84974588386
-
Timed Commitments
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Boneh, D., Naor, M.: Timed Commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, p. 236. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 236
-
-
Boneh, D.1
Naor, M.2
-
7
-
-
84956984263
-
Time-Stamping with Binary Linking Schemes
-
Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
-
Buldas, A., Laud, P., Lipmaa, H., Villemson, J.: Time-Stamping with Binary Linking Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, p. 486. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 486
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
Villemson, J.4
-
8
-
-
84946383816
-
Scantegrity II municipal election at Takoma Park: The first E2E binding governmental election with ballot privacy
-
Carback, R.T., Chaum, D., Clark, J., Conway, J., Essex, A., Hernson, P.S., Mayberry, T., Popoveniuc, S., Rivest, R.L., Shen, E., Sherman, A.T., Vora, P.L.: Scantegrity II municipal election at Takoma Park: the first E2E binding governmental election with ballot privacy. In: USENIX Security Symposium (2010)
-
USENIX Security Symposium (2010)
-
-
Carback, R.T.1
Chaum, D.2
Clark, J.3
Conway, J.4
Essex, A.5
Hernson, P.S.6
Mayberry, T.7
Popoveniuc, S.8
Rivest, R.L.9
Shen, E.10
Sherman, A.T.11
Vora, P.L.12
-
9
-
-
80052018605
-
Scantegrity II: End-to-end verifiability for optical scan election systems using invisible ink confirmation codes
-
Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R.L., Ryan, P.Y.A., Shen, E., Sherman, A.T.: Scantegrity II: end-to-end verifiability for optical scan election systems using invisible ink confirmation codes. In: EVT (2008)
-
(2008)
EVT
-
-
Chaum, D.1
Carback, R.2
Clark, J.3
Essex, A.4
Popoveniuc, S.5
Rivest, R.L.6
Ryan, P.Y.A.7
Shen, E.8
Sherman, A.T.9
-
10
-
-
72449146821
-
Security Notions and Generic Constructions for Client Puzzles
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Chen, L., Morrissey, P., Smart, N.P., Warinschi, B.: Security Notions and Generic Constructions for Client Puzzles. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 505-523. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 505-523
-
-
Chen, L.1
Morrissey, P.2
Smart, N.P.3
Warinschi, B.4
-
11
-
-
84865824936
-
On the use of financial data as a random beacon
-
Clark, J., Hengartner, U.: On the use of financial data as a random beacon. In: EVT/WOTE (2010)
-
(2010)
EVT/WOTE
-
-
Clark, J.1
Hengartner, U.2
-
13
-
-
33746586067
-
Efficient Memory Bound Puzzles Using Pattern Databases
-
Zhou, J., Yung,M., Bao, F. (eds.) ACNS 2006. Springer, Heidelberg
-
Doshi, S., Monrose, F., Rubin, A.D.: Efficient Memory Bound Puzzles Using Pattern Databases. In: Zhou, J., Yung,M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 98-113. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3989
, pp. 98-113
-
-
Doshi, S.1
Monrose, F.2
Rubin, A.D.3
-
14
-
-
84943235829
-
Pricing via Processing or Combatting Junk Mail
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
15
-
-
84948988332
-
Auditable Metering with Lightweight Security
-
Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. Springer, Heidelberg
-
Franklin, M.K., Malkhi, D.: Auditable Metering with Lightweight Security. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol. 1318, pp. 151-160. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1318
, pp. 151-160
-
-
Franklin, M.K.1
Malkhi, D.2
-
16
-
-
84958036480
-
Curbing Junk E-Mail via Secure Classification
-
Hirschfeld, R. (ed.) FC 1998. Springer, Heidelberg
-
Gabber, E., Jakobsson, M., Matias, Y., Mayer, A.: Curbing Junk E-Mail via Secure Classification. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 198-213. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1465
, pp. 198-213
-
-
Gabber, E.1
Jakobsson, M.2
Matias, Y.3
Mayer, A.4
-
17
-
-
84958038323
-
Publicly Verifiable Lotteries: Applications of Delaying Functions
-
Hirschfeld, R. (ed.) FC 1998. Springer, Heidelberg
-
Goldschlag, D.M., Stubblebine, S.G.: Publicly Verifiable Lotteries: Applications of Delaying Functions. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 214-226. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1465
, pp. 214-226
-
-
Goldschlag, D.M.1
Stubblebine, S.G.2
-
18
-
-
85028754690
-
How to Time-Stamp a Digital Document
-
Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
-
Haber, S., Stornetta, W.S.: How to Time-Stamp a Digital Document. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 437-455. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 437-455
-
-
Haber, S.1
Stornetta, W.S.2
-
20
-
-
84861587712
-
Client puzzles: A cryptographic defense against connection depletion attacks
-
Juels, A., Brainard, J.: Client puzzles: A cryptographic defense against con- nection depletion attacks. In: NDSS (1999)
-
(1999)
NDSS
-
-
Juels, A.1
Brainard, J.2
-
21
-
-
78049359365
-
Low-Cost Client Puzzles Based on Modular Exponentiation
-
Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
-
Karame, G.O., Čapkun, S.: Low-Cost Client Puzzles Based on Modular Exponentiation. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 679-697. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6345
, pp. 679-697
-
-
Karame, G.O.1
Čapkun, S.2
-
22
-
-
80052007221
-
Time-Lock Puzzles in the Random Oracle Model
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Mahmoody, M., Moran, T., Vadhan, S.: Time-Lock Puzzles in the Random Oracle Model. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 39-50. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 39-50
-
-
Mahmoody, M.1
Moran, T.2
Vadhan, S.3
-
23
-
-
84865827051
-
Non-interactive time-stamping and proofs of work in the random oracle model
-
ePrint 553
-
Mahmoody, M., Vadhan, S.P., Moran, T.: Non-interactive time-stamping and proofs of work in the random oracle model. IACR ePrint 553 (2011)
-
(2011)
IACR
-
-
Mahmoody, M.1
Vadhan, S.P.2
Moran, T.3
-
24
-
-
84865827047
-
Enabling the long-term archival of signed documents through time stamping
-
Maniatis, P., Baker, M.: Enabling the long-term archival of signed documents through time stamping. In: FAST (2002)
-
(2002)
FAST
-
-
Maniatis, P.1
Baker, M.2
-
25
-
-
35048857905
-
Non-interactive Timestamping in the Bounded Storage Model
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Moran, T., Shaltiel, R., Ta-Shma, A.: Non-interactive Timestamping in the Bounded Storage Model. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 460-476. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 460-476
-
-
Moran, T.1
Shaltiel, R.2
Ta-Shma, A.3
-
27
-
-
0012024318
-
-
Technical Report WP3, TIMESEC Project
-
Preneel, B., Rompay, B.V., Quisquater, J.J., Massias, H., Avila, J.S.: Design of a timestamping system. Technical Report WP3, TIMESEC Project (1998)
-
(1998)
Design of a Timestamping System
-
-
Preneel, B.1
Rompay, B.V.2
Quisquater, J.J.3
Massias, H.4
Avila, J.S.5
-
28
-
-
84979076059
-
PayWord and MicroMint: Two Simple Micropayment Schemes
-
Lomas, M. (ed.) Security Protocols 1996. Springer, Heidelberg
-
Rivest, R.L., Shamir, A.: PayWord and MicroMint: Two Simple Micropayment Schemes. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 69-87. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1189
, pp. 69-87
-
-
Rivest, R.L.1
Shamir, A.2
-
30
-
-
79951798566
-
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service- Resistant Protocols
-
Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
-
Stebila, D., Kuppusamy, L., Rangasamy, J., Boyd, C., Gonzalez Nieto, J.: Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 284-301. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6558
, pp. 284-301
-
-
Stebila, D.1
Kuppusamy, L.2
Rangasamy, J.3
Boyd, C.4
Gonzalez Nieto, J.5
-
31
-
-
38349080863
-
Toward Non-parallelizable Client Puzzles
-
Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. Springer, Heidelberg
-
Tritilanunt, S., Boyd, C., Foo, E., González Nieto, J.M.: Toward Non-parallelizable Client Puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 247-264. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4856
, pp. 247-264
-
-
Tritilanunt, S.1
Boyd, C.2
Foo, E.3
González Nieto, J.M.4
-
33
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
Waters, B., Juels, A., Halderman, J.A., Felten, E.W.: New client puzzle outsourcing techniques for DoS resistance. In: CCS (2004)
-
(2004)
CCS
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
|