-
1
-
-
33750062015
-
Bankable postage for network services
-
December
-
M. Abadi, A. Birrell, M. Burrows, F. Dabek, and T. Wobber. Bankable postage for network services. In Proceedings of the 8th Asian Computing Science Conference, December 2003.
-
(2003)
Proceedings of the 8th Asian Computing Science Conference
-
-
Abadi, M.1
Birrell, A.2
Burrows, M.3
Dabek, F.4
Wobber, T.5
-
2
-
-
85045893940
-
Moderately hard, memory-bound functions
-
February
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, February 2003.
-
(2003)
Proceedings of the 10th Annual Network and Distributed System Security Symposium
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
6
-
-
84904814563
-
-
July 14
-
P. B. Carroll. Charity cases, July 14, 2008. The Wall Street Journal, http://online.wsj.com/article/SB121554292423936539.html.
-
(2008)
Charity Cases
-
-
Carroll, P.B.1
-
9
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Proceedings of CRYPTO'92, pages 137-147, 1993.
-
(1993)
Proceedings of CRYPTO'92
, pp. 137-147
-
-
Dwork, C.1
Naor, M.2
-
11
-
-
3242763586
-
Selling interrupt rights: A way to control unwanted e-mail and telephone calls
-
S. E. Fahlman. Selling interrupt rights: A way to control unwanted e-mail and telephone calls. IBM Systems Journal, 41(4):759-766, 2002.
-
(2002)
IBM Systems Journal
, vol.41
, Issue.4
, pp. 759-766
-
-
Fahlman, S.E.1
-
15
-
-
84904823783
-
-
F. Research. The Cost of Spam False Positives. http://www.ferris.com/ 2003/08/14/the-cost-of-spam-false-positives, 2008.
-
(2008)
The Cost of Spam False Positives
-
-
-
16
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21:120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
19
-
-
2942728016
-
Telling humans and computers apart automatically: How lazy cryptographers do ai
-
L. von Ahn, M. Blum, and J. Langford. Telling humans and computers apart automatically: How lazy cryptographers do ai. Communications of the ACM, 2004.
-
(2004)
Communications of the ACM
-
-
Von Ahn, L.1
Blum, M.2
Langford, J.3
-
20
-
-
51749107030
-
Captcha: Human-based character recognition via web security measures
-
L. von Ahn, B. Maurer, C. McMillen, D. Abraham, and M. Blum. Captcha: Human-based character recognition via web security measures. Science, 321:1465, 2008.
-
(2008)
Science
, vol.321
, pp. 1465
-
-
Von Ahn, L.1
Maurer, B.2
McMillen, C.3
Abraham, D.4
Blum, M.5
|