A comprehensive review of cybersecurity in inverter-based smart power system amid the boom of renewable energy

ND Tuyen, NS Quan, VB Linh, V Van Tuyen… - IEEE …, 2022 - ieeexplore.ieee.org
The blossom of renewable energy worldwide and its uncertain nature have driven the need
for a more intelligent power system with the deep integration of smart power electronics. The …

Foundations, properties, and security applications of puzzles: A survey

IM Ali, M Caprolu, RD Pietro - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic algorithms have been used not only to create robust ciphertexts but also to
generate cryptograms that, contrary to the classic goal of cryptography, are meant to be …

[PDF][PDF] Internet denial of service attacks and defense mechanisms

M Abliz - University of Pittsburgh, Department of Computer …, 2011 - blog.oureducation.in
Availability is one of the three main components of computer security, along with
confidentiality and integrity. Denial of service (DoS) is a threat that potentially violates the …

Multi-instance publicly verifiable time-lock puzzle and its applications

A Abadi, A Kiayias - Financial Cryptography and Data Security: 25th …, 2021 - Springer
Time-lock puzzles are elegant protocols that enable a party to lock a message such that no
one else can unlock it until a certain time elapses. Nevertheless, existing schemes are not …

A guided tour puzzle for denial of service prevention

M Abliz, T Znati - 2009 Annual Computer Security Applications …, 2009 - ieeexplore.ieee.org
Various cryptographic puzzle schemes are proposed as a defense mechanism against
denial of service attack. But, all these puzzle schemes face a dilemma when there is a large …

Toward non-parallelizable client puzzles

S Tritilanunt, C Boyd, E Foo… - Cryptology and Network …, 2007 - Springer
Client puzzles have been proposed as a useful mechanism for mitigating denial of service
attacks on network protocols. Several different puzzles have been proposed in recent years …

Security notions and generic constructions for client puzzles

L Chen, P Morrissey, NP Smart, B Warinschi - Advances in Cryptology …, 2009 - Springer
By a computational puzzle we mean a mildly difficult computational problem that requires
resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses …

Moderately hard functions: Definition, instantiations, and applications

J Alwen, B Tackmann - … Conference, TCC 2017, Baltimore, MD, USA …, 2017 - Springer
Several cryptographic schemes and applications are based on functions that are both
reasonably efficient to compute and moderately hard to invert, including client puzzles for …

[图书][B] Theoretical and experimental methods for defending against DDoS attacks

IS Amiri, MRK Soltanian - 2015 - books.google.com
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource
unavailable due to overloading the resource or machine with an overwhelming number of …

[PDF][PDF] Cryptographic puzzles and game theory against dos and ddos attacks in networks

A Michalas, N Komninos, NR Prasad - International Journal of …, 2012 - academia.edu
In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed
Denial of Service (DDoS) attacks. In the first part, we describe client puzzle techniques that …