M Abliz, T Znati - Proceedings of IARIA 7th International Conference …, 2012 - 72.52.166.99
Distributed denial of service (DDoS) attacks pose great threat to the Internet and its public services. Various computation-based cryptographic puzzle schemes have been proposed to …
S Tritilanunt - IFIP Annual Conference on Data and Applications …, 2010 - Springer
We provides an evaluation of non-parallelizable puzzles used to prevent DoS in authentication protocols. With an evaluation based on a simulation and performance …
M Abliz, T Znati, AJ Lee - International Journal on Advances in Security …, 2012 - Citeseer
Various cryptographic puzzle schemes have been proposed as defenses against Denial of Service (DoS) attacks. However, these schemes have two common shortcomings that …
V Bocan, M Fagadar-Cosma - IT Policy and Ethics: Concepts …, 2013 - igi-global.com
Cryptographic authentication systems are currently the de facto standard for securing clients access to network services. Although they offer enhanced security for the parties involved in …
M Al Dhanhani, B Al Rasebi… - UAE Graduate …, 2016 - researchgate.net
Denial and Distributed Denial-of-Service attacks continue to be easy to carry while wreaking havoc on todays' Internet. This paper examines the feasibility of implementing video …
Cryptographic puzzles are promising techniques for mitigating DDoS attacks via decreasing the incoming rate of service eligible requests. However, existing cryptographic puzzle …
M Wan, WL Shang, JM Zhao… - Advanced Materials …, 2014 - Trans Tech Publ
Client puzzles, a type of cryptographic puzzle, have been proposed and developed by many scholars to guarantee network security. In this paper, we proposed C2Puzzle, a novel …