-
2
-
-
33847164331
-
Not all Asian E-mail is spam
-
Feb 19
-
Michelle Delio. Not All Asian E-Mail is Spam. In Wired News, Feb 19 2002.
-
(2002)
Wired News
-
-
Delio, M.1
-
7
-
-
0002459783
-
Client puzzles: A cryptographic defense against connection depletion
-
A. Juels and J. Brainard. Client Puzzles: A Cryptographic Defense Against Connection Depletion. In NDSS, pages 151{165, 1999.
-
(1999)
NDSS
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
9
-
-
85034043506
-
Protecting web servers from distributed denial of service attacks
-
F. Kargl, J. Maier, and M. Weber. Protecting Web Servers from Distributed Denial of Service Attacks. In World Wide Web, pages 514{524, 2001.
-
(2001)
World Wide Web
, pp. 514-524
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
-
10
-
-
0038742365
-
Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
-
May
-
J. Jung, B. Krishnamurthy, and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In International World Wide Web Conference, pages 252{ 262, May 2002.
-
(2002)
International World Wide Web Conference
, pp. 252-262
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
11
-
-
84949199141
-
Mitigating distributed denial of service attacks with dynamic resource pricing
-
D. Mankins, R. Krishnan, C. Boyd, J. Zaho, and M. Frentz. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. In Proceedings of Annual Computer Security Applications Conference (ACSAC 2001), 2001.
-
(2001)
Proceedings of Annual Computer Security Applications Conference (ACSAC 2001)
-
-
Mankins, D.1
Krishnan, R.2
Boyd, C.3
Zaho, J.4
Frentz, M.5
-
12
-
-
14844310899
-
Hashcash: A denial of service counter- measure
-
August
-
A. Back. Hashcash: A Denial of Service Counter- Measure. Technical report, Cypherspace, August 2002. http://cypherspace.org/hashcash/hashcash.pdf.
-
(2002)
Technical Report Cypherspace
-
-
Back, A.1
-
13
-
-
0001126172
-
Pricing via processing or combatting junk mail
-
August
-
C. Dwork and M. Naor. Pricing via Processing or Combatting Junk Mail. In Crypto, August 1992.
-
(1992)
Crypto
-
-
Dwork, C.1
Naor, M.2
-
14
-
-
84904799683
-
'Challenge-response' technology rejects messages unless senders are cleared by recipients
-
May 7
-
Jonathan Krim. 'challenge-response' technology rejects messages unless senders are cleared by recipients. Washington Post News article, May 7, 2003.
-
(2003)
Washington Post News Article
-
-
Krim, J.1
-
16
-
-
2442603590
-
Security for peer-to-peer routing overlays
-
December
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Security for Peer-to-Peer Routing Overlays. In Proceedings of OSDI, December 2002.
-
(2002)
Proceedings of OSDI
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
18
-
-
84904801435
-
-
Hotmail sets email limits. http://news.zdnet.co. uk/business/0,39020645, 2132358,00.htm.
-
Hotmail Sets Email Limits
-
-
-
19
-
-
84904809469
-
-
Axel Zinser. Teergrubing. http://iksjena.de/mitarb/lutz/usenet/teergrube.
-
-
-
Zinser, A.1
-
23
-
-
33750308460
-
-
Sam Holden. Spam filter evaluations. available at http://sam.holden.id. au/writings/spam2/.
-
Spam Filter Evaluations
-
-
-
25
-
-
84904790430
-
-
Perl monger mailinglist. available at http://mail.pm.org/archives/ classiccity-pm/.
-
Perl Monger Mailinglist
-
-
|