DDoS attacks in cloud computing: Issues, taxonomy, and future directions

G Somani, MS Gaur, D Sanghi, M Conti… - Computer …, 2017 - Elsevier
Security issues related to the cloud computing are relevant to various stakeholders for an
informed cloud adoption decision. Apart from data breaches, the cyber security research …

Proof-of-learning: Definitions and practice

H Jia, M Yaghini, CA Choquette-Choo… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Training machine learning (ML) models typically involves expensive iterative optimization.
Once the model's final parameters are released, there is currently no mechanism for the …

[PDF][PDF] What is the Cryptocurrency

B Zohuri, HT Nguyen… - Is it a threat to our national …, 2022 - unisciencepub.com
Since the rise of Bitcoin in 2009 and recent interest in digital currency is on an ascending
trend, the question is how far will it penetrate in financial system other industries? How …

Proofs of space: When space is of the essence

G Ateniese, I Bonacina, A Faonio, N Galesi - Security and Cryptography …, 2014 - Springer
Proofs of computational effort were devised to control denial of service attacks. Dwork and
Naor (CRYPTO'92), for example, proposed to use such proofs to discourage spam. The idea …

SECMACE: Scalable and robust identity and credential management infrastructure in vehicular communication systems

M Khodaei, H Jin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Several years of academic and industrial research efforts have converged to a common
understanding on fundamental security building blocks for the upcoming vehicular …

Systems and methods for classification of internet devices as hostile or benign

K Gutzmann - US Patent 9,807,092, 2017 - Google Patents
A dynamic access pricing and active countermeasure system and method for detecting and
protecting against automated Internet attackers that incapacitates or disables the attackers …

Scaling pseudonymous authentication for large mobile systems

M Khodaei, H Noroozi, P Papadimitratos - Proceedings of the 12th …, 2019 - dl.acm.org
The central building block of secure and privacy-preserving Vehicular Communication (VC)
systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with …

Foundations, properties, and security applications of puzzles: A survey

IM Ali, M Caprolu, RD Pietro - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic algorithms have been used not only to create robust ciphertexts but also to
generate cryptograms that, contrary to the classic goal of cryptography, are meant to be …

Blockchain: Verlässliche Transaktionen

W Prinz, T Rose, T Osterland, C Putschli… - … für Wirtschaft und …, 2018 - Springer
Zusammenfassung Zur Digitalisierung von Diensten und Prozessen besitzt die Blockchain-
Technologie eine große Relevanz für viele verschiedene Anwendungsbereiche außerhalb …

System and methods for classifying internet devices as hostile or benign

KM Gutzmann - US Patent 9,705,895, 2017 - Google Patents
Abstract Systems and methods for classification of internet devices for classifying devices on
the Internet as either hostile or benign. Hostile devices are those that are or will be engaging …