-
1
-
-
85045893940
-
Moderately hard, memory-bound functions
-
M. Abadi, M. Burrow, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, 2003.
-
(2003)
Proceedings of the 10th Annual Network and Distributed System Security Symposium
-
-
Abadi, M.1
Burrow, M.2
Manasse, M.3
Wobber, T.4
-
2
-
-
0037517134
-
Dos-resistant authentication with client puzzles
-
Proceedings of the Cambridge Security Protocols Worshop 2000. Springer-Verlag
-
T. Aura, P. Nikander, and J. Leiwo. Dos-resistant authentication with client puzzles. In Proceedings of the Cambridge Security Protocols Worshop 2000. LNCS, Springer-Verlag, 2000.
-
(2000)
LNCS
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
5
-
-
84974588386
-
Timed commitments
-
(extended abstract). Proceedings of Advances in Cryptology - CRYPTO'00, Springer-Verlag
-
D. Boneh and M. Naor. Timed commitments (extended abstract). In Proceedings of Advances in Cryptology - CRYPTO'00, volume 1880 of Lecture Notes in Computer Science, pages 236-254. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
7
-
-
4143130116
-
-
June 4
-
CERT. Denial of service attacks. In http://www.cert.org/tech-tips/denial-of-service.html, June 4 2001.
-
(2001)
Denial of Service Attacks
-
-
-
12
-
-
84943235829
-
Pricing via processing or combating junk mail
-
E. Brickell, editor, Proceedings of ADVANCES IN CRYPTOLOGY - CRYPTO 92, Springer-Verlag
-
C. Dwork and M. Naor. Pricing via processing or combating junk mail. In E. Brickell, editor, Proceedings of ADVANCES IN CRYPTOLOGY - CRYPTO 92, volume 1328 of Lecture Notes in Computer Science, pages 139-147. Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.1328
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
13
-
-
3142747919
-
Auditable metering with lightweight security
-
R. Hirschfeld, editor, Proceedings of Financial Cryptography 97 (FC 97), Springer-Verlag
-
M. K. Franklin and D. Malkhi. Auditable metering with lightweight security. In R. Hirschfeld, editor, Proceedings of Financial Cryptography 97 (FC 97), Lecture Notes in Computer Science. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
-
-
Franklin, M.K.1
Malkhi, D.2
-
15
-
-
0034229418
-
Defeating distributed denial of service attacks
-
July-August
-
X. Geng and A. Whinston. Defeating distributed denial of service attacks. IEEE IT Professional, 2(4):36-41, July-August 2000.
-
(2000)
IEEE IT Professional
, vol.2
, Issue.4
, pp. 36-41
-
-
Geng, X.1
Whinston, A.2
-
18
-
-
84861587712
-
Client puzzle: A cryptographic defense against connection depletion attacks
-
S. Kent, editor
-
A. Juels and J. Brainard. Client puzzle: A cryptographic defense against connection depletion attacks. In S. Kent, editor, Proceedings of NDSS'99, pages 151-165, 1999.
-
(1999)
Proceedings of NDSS'99
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
19
-
-
3042859154
-
Resisting syn flood dos attacks with a syn cache
-
S. J. Leffler, editor, USENIX, February 11-14
-
J. Lemmon. Resisting syn flood dos attacks with a syn cache. In S. J. Leffler, editor, Proceedings of BSDCon 2002. USENIX, February 11-14, 2002.
-
(2002)
Proceedings of BSDCon 2002
-
-
Lemmon, J.1
-
21
-
-
47649085814
-
Defensive programming: Using an annotation toolkit to build dos-resistant software
-
December
-
X. Qie, R. Pang, and L. Peterson. Defensive programming: Using an annotation toolkit to build dos-resistant software. In Proceedings of the 5th OSDI Symposium, December 2002.
-
(2002)
Proceedings of the 5th OSDI Symposium
-
-
Qie, X.1
Pang, R.2
Peterson, L.3
|