Efficient, DoS-resistant, secure key exchange for internet protocols
Proceedings of the 9th ACM conference on Computer and communications security
Secure Distributed Computing in a Commercial Environment
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Electronic Payments: Where Do We Go from Here?
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Just fast keying: Key agreement in a hostile internet
ACM Transactions on Information and System Security (TISSEC)
New client puzzle outsourcing techniques for DoS resistance
Proceedings of the 11th ACM conference on Computer and communications security
The dual receiver cryptosystem and its applications
Proceedings of the 11th ACM conference on Computer and communications security
Graceful service degradation (or, how to know your payment is late)
Proceedings of the 6th ACM conference on Electronic commerce
Moderately hard, memory-bound functions
ACM Transactions on Internet Technology (TOIT)
Countering DoS attacks with stateless multipath overlays
Proceedings of the 12th ACM conference on Computer and communications security
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
Establishing the genuinity of remote computer systems
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Cost-based and time-based analysis of DoS-resistance in HIP
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
Free riding-aware forwarding in Content-Addressable Networks
The VLDB Journal — The International Journal on Very Large Data Bases
Pors: proofs of retrievability for large files
Proceedings of the 14th ACM conference on Computer and communications security
A connection management protocol for promoting cooperation in Peer-to-Peer networks
Computer Communications
Denial-of-service resistance in key establishment
International Journal of Wireless and Mobile Computing
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
A generic construction of useful client puzzles
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Towards Denial-of-Service-Resilient Key Agreement Protocols
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
International Journal of Information and Computer Security
Security Notions and Generic Constructions for Client Puzzles
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Reliable MIX cascade networks through reputation
FC'02 Proceedings of the 6th international conference on Financial cryptography
Combating spam and denial-of-service attacks with trusted puzzle solvers
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An (almost) constant-effort solution-verification proof-of-work protocol based on Merkle trees
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Reconstructing hash reversal based proof of work schemes
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Examining the dos resistance of HIP
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Towards truthful feedback in p2p data structures
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I
A secure distance-based RFID identification protocol with an off-line back-end database
Personal and Ubiquitous Computing
Hourglass schemes: how to prove that cloud files are encrypted
Proceedings of the 2012 ACM conference on Computer and communications security
Probabilistic opaque quorum systems
DISC'07 Proceedings of the 21st international conference on Distributed Computing
Distributing trusted third parties
ACM SIGACT News
Useful password hashing: how to waste computing cycles with style
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.02 |