2001
DOI: 10.1007/3-540-44810-1_23
|View full text |Cite
|
Sign up to set email alerts
|

DOS-Resistant Authentication with Client Puzzles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
99
0

Year Published

2003
2003
2014
2014

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 139 publications
(99 citation statements)
references
References 14 publications
0
99
0
Order By: Relevance
“…The computational puzzles of HIP [1] play a major role in this paper and have been investigated by others as well. Beal et al [3] developed a mathematical model to evaluate the usefulness of the HIP puzzle under steady-state DDoS attacks.…”
Section: Host Identity Protocolmentioning
confidence: 99%
“…The computational puzzles of HIP [1] play a major role in this paper and have been investigated by others as well. Beal et al [3] developed a mathematical model to evaluate the usefulness of the HIP puzzle under steady-state DDoS attacks.…”
Section: Host Identity Protocolmentioning
confidence: 99%
“…Different mechanisms exist to ensure this property, e.g., IKE cookies [27], client puzzles [28], and a distributed management. -Graceful Degradation: In the case of a partial DoS attack or compromise, other not directly affected VPN devices shall continue to work.…”
Section: Security Objectivesmentioning
confidence: 99%
“…A few proofof-work protocols have been proposed in the literature [7,8,24,28,35,121,123]. A proof-of-work (also known as "cryptographic puzzles" or "client puzzles") protocol extends a client-server request-driven application protocol so that the server issues prospective clients computational challenges of client-specific difficulty.…”
Section: The Case For Proof-of-workmentioning
confidence: 99%
“…Proof-of-work approaches proposed in the literature [7,8,24,28,35,121,123] have demonstrated the feasibility of implementing proof-of-work systems at the network and transport layers. While the approaches have experimentally proved their effectiveness against portscans and network-level packet-flooding denial-ofservice attacks, they have all met resistance to adoption due to one fundamental detraction: they require both clients and servers to adopt specialized software in order to adhere to the protocol.…”
Section: The Kapow Approachmentioning
confidence: 99%
See 1 more Smart Citation