-
1
-
-
84881410785
-
-
August
-
The Electronic Frontier Foundation. (2010, August) SSL Observatory. [Online]. https://www.eff.org/observatory
-
(2010)
SSL Observatory
-
-
-
2
-
-
84881421724
-
-
A Back. (1997) Hashcash.org. [Online]. http://hashcash.org
-
(1997)
-
-
Back, A.1
-
3
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
Ari Juels and John Brainard, "Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks," in Proceedings of NDSS '99, 1999, pp. 151-165.
-
(1999)
Proceedings of NDSS '99
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
4
-
-
84881464674
-
Bitcoin: A peer-to-peer electronic cash system
-
Satoshi Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," CRFDL Computing, 2009.
-
(2009)
CRFDL Computing
-
-
Nakamoto, S.1
-
5
-
-
84881441671
-
-
Namecoin DNS-DotBIT Project
-
Namecoin DNS - DotBIT Project. [Online]. http://dot-bit.org
-
-
-
-
7
-
-
33947705721
-
-
September, RFC 4158
-
M., Dzambasow, Y., Hesse, P., Joseph, S., and R. Nicholas Cooper, Internet X.509 Public Key Infrastructure: Certification Path Building, September 2005, RFC 4158.
-
(2005)
Internet X.509 Public Key Infrastructure: Certification Path Building
-
-
Dzambasow, Y.1
Hesse, P.2
Joseph, S.3
Cooper, R.N.4
-
8
-
-
85034040740
-
-
USENIX, Boston
-
Dan Wendlandt, David G. Andersen, and Adrian Perrig, "Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing," in USENIX, Boston, 2008.
-
(2008)
Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing
-
-
Wendlandt, D.1
Andersen, D.G.2
Perrig, A.3
-
10
-
-
71649094416
-
A survey of attack and defense techniques for reputation systems
-
Kevin Hoffman, David Zage, and Cristina Nita-Rotaru, "A survey of attack and defense techniques for reputation systems," ACM Computing Surveys (CSUR), vol. 42, no. 1, pp. 1-31, 2009.
-
(2009)
ACM Computing Surveys (CSUR)
, vol.42
, Issue.1
, pp. 1-31
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
11
-
-
84863345060
-
-
March
-
VeriSign Inc. (2012, March) The domain name industry brief. [Online]. http://www.verisigninc.com/assets/domain-namebrief- march2012.pdf
-
(2012)
The Domain Name Industry Brief
-
-
-
15
-
-
79551566748
-
Providing trust in wireless sensor networks using a bioinspired technique
-
February
-
Félix Gómez Mármol and Gregorio Martínez Pérez, "Providing trust in wireless sensor networks using a bioinspired technique," Telecommunication Systems, vol. 46, no. 2, pp. 163-180, February 2011.
-
(2011)
Telecommunication Systems
, vol.46
, Issue.2
, pp. 163-180
-
-
Mármol, F.G.1
Pérez, G.M.2
-
16
-
-
84881394237
-
Inter-administrative challenges in managing DNSKEYs
-
Accepted papers
-
Eric Osterweil and Lixia Zhang, "Inter-Administrative Challenges in Managing DNSKEYs," IEEE Security & Privacy, vol. Accepted papers, 2011.
-
(2011)
IEEE Security & Privacy
-
-
Osterweil, E.1
Zhang, L.2
-
17
-
-
34047150751
-
Power trust: A robust and scalable reputation system for trusted peer-to-peer computing
-
Runfang Zhou and Kai Hwang, "PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing," IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 4, pp. 460-473, 2007.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.4
, pp. 460-473
-
-
Zhou, R.1
Hwang, K.2
|