-
1
-
-
85080512221
-
-
Bitcoin. http://www.bitcoin.org/.
-
-
-
-
2
-
-
85080541486
-
-
Bloom Filter. http://en.wikipedia.org/wiki/Bloom filter.
-
-
-
-
3
-
-
84872834446
-
-
Folding@Home. http://folding.stanford.edu/.
-
Folding@Home
-
-
-
6
-
-
85080526052
-
-
Phish fighters floored by DDoS assault. 02/20
-
Phish fighters floored by DDoS assault. The Register (theregister.co.uk) (02/20/2007).
-
(2007)
The Register (Theregister.Co.Uk)
-
-
-
7
-
-
85080624379
-
Surge in hijacked PC networks
-
bbc.co.uk 03/19
-
Surge in hijacked PC networks. BBC (bbc.co.uk) (03/19/2007).
-
(2007)
BBC
-
-
-
8
-
-
21644461880
-
Moderately hard, memory-bound functions
-
ABADI, M., BURROWS, M., MANASSE, M., AND WOBBER, T. Moderately hard, memory-bound functions. ACM Trans. Inter. Tech. 5, 2 (2005), 299–327.
-
(2005)
ACM Trans. Inter. Tech.
, vol.5
, Issue.2
, pp. 299-327
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
11
-
-
78049334714
-
Md5 chosen-prefix collisions on GPUs
-
BEVAND, M. Md5 chosen-prefix collisions on gpus. Black Hat USA (2009).
-
(2009)
Black Hat USA
-
-
Bevand, M.1
-
13
-
-
18844375030
-
On memory-bound functions for fighting spam
-
DWORK, C., GOLDBERG, A., AND NAOR, M. On memory-bound functions for fighting spam. CRYPTO (2003).
-
(2003)
CRYPTO
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
-
15
-
-
25644445353
-
The design and implementation of network puzzles
-
FENG, W., FENG, W., AND LUU, A. The design and implementation of network puzzles. In In Proc. Annual Joint Conf. of IEEE Computer and Communications Societies (INFOCOM) (2005), pp. 2372–2382.
-
(2005)
Proc. Annual Joint Conf. Of IEEE Computer and Communications Societies (INFOCOM)
, pp. 2372-2382
-
-
Feng, W.1
Feng, W.2
Luu, A.3
-
16
-
-
25644445353
-
The design and implementation of network puzzles
-
March
-
FENG, W., KAISER, E., AND LUU, A. The design and implementation of network puzzles. In IEEE INFOCOM (March 2005).
-
(2005)
IEEE INFOCOM
-
-
Feng, W.1
Kaiser, E.2
Luu, A.3
-
20
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
San Diego, California, USA
-
JUELS, A., AND BRAINARD, J. G. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA (1999).
-
(1999)
Proceedings of the Network and Distributed System Security Symposium, NDSS 1999
-
-
Juels, A.1
Brainard, J.G.2
-
21
-
-
85080494092
-
Helping ticketmaster: Changing the economics of ticket robots with geographic proof-of-work
-
KAISER, E., AND CHANG FENG, W. Helping ticketmaster: Changing the economics of ticket robots with geographic proof-of-work. In Global Internet (2010).
-
(2010)
Global Internet
-
-
Kaiser, E.1
Chang Feng, W.2
-
22
-
-
84924375780
-
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
-
Boston, MA, May
-
KANDULA, S., KATABI, D., JACOB, M., AND BERGER, A. W. Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds. In 2nd Symposium on Networked Systems Design and Implementation (NSDI) (Boston, MA, May 2005).
-
(2005)
2nd Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.W.4
-
23
-
-
51349132481
-
Adaptive selective verification
-
Phoenix, AZ, April IEEE
-
KHANNA, S., VENKATESH, S. S., FATEMIEH, O., KHAN, F., AND GUNTER, C. A. Adaptive selective verification. In INFOCOM ’08: IEEE Conference on Computer Communications (Phoenix, AZ, April 2008), IEEE.
-
(2008)
INFOCOM ’08: IEEE Conference on Computer Communications
-
-
Khanna, S.1
Venkatesh, S.S.2
Fatemieh, O.3
Khan, F.4
Gunter, C.A.5
-
24
-
-
55849112143
-
Proof-of-work” proves not to work
-
LAURIE, B., AND CLAYTON, R.”proof-of-work” proves not to work. In WEAS 04 (2004).
-
(2004)
WEAS 04
-
-
Laurie, B.1
Clayton, R.2
-
26
-
-
84949199141
-
Mitigating distributed denial of service attacks with dynamic resource pricing
-
Washington, DC, USA, IEEE Computer Society
-
MANKINS, D., KRISHNAN, R., BOYD, C., ZAO, J., AND FRENTZ, M. Mitigating distributed denial of service attacks with dynamic resource pricing. In ACSAC’01: Proceedings of the 17th Annual Computer Security Applications Conference (Washington, DC, USA, 2001), IEEE Computer Society, p. 411.
-
(2001)
ACSAC’01: Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 411
-
-
Mankins, D.1
Krishnan, R.2
Boyd, C.3
Zao, J.4
Frentz, M.5
-
27
-
-
36949036429
-
Portcullis: Protecting connection setup from denial-of-capability attacks
-
New York, NY, USA, ACM
-
PARNO, B., WENDLANDT, D., SHI, E., PERRIG, A., MAGGS, B., AND HU, Y.-C. Portcullis: protecting connection setup from denial-of-capability attacks. In SIGCOMM’07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications (New York, NY, USA, 2007), ACM, pp. 289–300.
-
(2007)
SIGCOMM’07: Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 289-300
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu, Y.-C.6
-
29
-
-
84919820657
-
Resource inflation threats to denial of service countermeasures
-
Oct
-
SHANKESI, R., FATEMIEH, O., AND GUNTER, C. A. Resource inflation threats to denial of service countermeasures. UIUC Tech. Report, http://hdl.handle.net/2142/17372, Oct. 2010.
-
(2010)
UIUC Tech. Report
-
-
Shankesi, R.1
Fatemieh, O.2
Gunter, C.A.3
-
30
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auctions
-
Washington, DC, USA, IEEE Computer Society
-
WANG, X., AND REITER, M. K. Defending against denial-of-service attacks with puzzle auctions. In SP’03: Proceedings of the 2003 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2003), IEEE Computer Society, p. 78.
-
(2003)
SP’03: Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 78
-
-
Wang, X.1
Reiter, M.K.2
-
31
-
-
14844300104
-
New client puzzle outsourcing techniques for dos resistance
-
WATERS, B., JUELS, A., HALDERMAN, J. A., AND FELTEN, E. New client puzzle outsourcing techniques for dos resistance. in Proceedings of Computer and Communications Security (2004).
-
(2004)
Proceedings of Computer and Communications Security
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.4
|