Zobrazeno 1 - 10
of 46
pro vyhledávání: '"client puzzle"'
Autor:
Vladimir Bostanov
Publikováno v:
IEEE Access, Vol 9, Pp 75722-75728 (2021)
Proof-of-work (PoW) schemes implemented in client puzzle protocols (CPPs) have been proposed as a protection from Denial-of-Service (DoS) attacks against internet facing servers. A CPP designed to thwart attacks against a certain client-server protoc
Externí odkaz:
https://doaj.org/article/49be1d4824a0479eabc211922ca01cb0
Autor:
Alex Biryukov, Dmitry Khovratovich
Publikováno v:
Ledger, Vol 2, Iss 0, Pp 1-30 (2017)
Proof-of-work is a central concept in modern cryptocurrencies and denial-ofservice protection tools, but the requirement for fast verification so far has made it an easy prey for GPU-, ASIC-, and botnet-equipped users. The attempts to rely on memory-
Externí odkaz:
https://doaj.org/article/5c08d721838a4b7c8ed006087e0b43cb
Autor:
Wang, Jiahao
In modern Mobile Ad hoc Networks (MANETs), service discovery is a major component for mobile devices to exchange data and find available services. However, service discovery architectures developed and adopted by the industry either are not appropria
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-313838
Autor:
Wang, Jiahao
In modern Mobile Ad hoc Networks (MANETs), service discovery is a major component for mobile devices to exchange data and find available services. However, service discovery architectures developed and adopted by the industry either are not appropria
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::74eebebced7ed1171f4eaecd7324b5ef
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-313838
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-313838
Publikováno v:
Tongxin xuebao, Vol 30, Pp 93-99 (2009)
Through deeply analyzing on the principle,mode,character of DoS,and the DoS attack faced by SIP network,combining with the idea of Client Puzzle,DFA,long-distance linkage,host linkagethe,the character of SIP network,and the principle of SIP proxy ser
Externí odkaz:
https://doaj.org/article/31c462532ded4317afe63050fd767228
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Alex Biryukov, Dmitry Khovratovich
Publikováno v:
NDSS
Ledger, Vol 2, Iss 0, Pp 1-30 (2017)
Proceedings of NDSS 2016 (pp. 13). (2016).
Ledger, Vol 2, Iss 0, Pp 1-30 (2017)
Proceedings of NDSS 2016 (pp. 13). (2016).
Proof-of-work is a central concept in modern cryptocurrencies and denial-ofservice protection tools, but the requirement for fast verification so far has made it an easy prey for GPU-, ASIC-, and botnet-equipped users. The attempts to rely on memory-
Autor:
Lee, Isaac Chien-Wei
With the advance of wireless access technologies, the IEEE 802.11 wireless local area network (WLAN) has gained significant increase in popularity and deployment due to the substantially improved transmission rate and decreased deployment costs. Howe
Externí odkaz:
http://hdl.handle.net/10092/5076