메뉴 건너뛰기




Volumn , Issue , 2001, Pages

Using client puzzles to protect TLS

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL LIBRARIES; NETWORK SECURITY;

EID: 85084162892     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (163)

References (9)
  • 3
    • 0001126172 scopus 로고
    • Pricing via processing or combatting Junk mail
    • Ernest F. Brickell, editor Springer-Verlag Lecture Notes in Computer Science No. 740
    • Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In Ernest F. Brickell, editor, Proc. CRYPTO 92, pages 139-147. Springer-Verlag, 1992. Lecture Notes in Computer Science No. 740.
    • (1992) Proc. CRYPTO 92 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 6
    • 0032265905 scopus 로고    scopus 로고
    • Auditable metering with lightweight security
    • Matthew K. Franklin and Dahlia Malkhi. Auditable metering with lightweight security. Journal of Computer Security, 6(4):237-255, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.4 , pp. 237-255
    • Franklin, M.K.1    Malkhi, D.2
  • 7
    • 0002459783 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic defense against connection depletion attacks
    • S. Kent, editor
    • Ari Juels and John Brainard. Client puzzles: A cryptographic defense against connection depletion attacks. In S. Kent, editor, Proceedings of NDSS '99, pages 151-165, 1999.
    • (1999) Proceedings of NDSS '99 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 8
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • April
    • R. C. Merkle. Secure communications over insecure channels. Communications of the ACM, 21:294-299, April 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 294-299
    • Merkle, R.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.