Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
DOI: 10.1109/infcom.2005.1498523
|View full text |Cite
|
Sign up to set email alerts
|

The design and implementation of network puzzles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(8 citation statements)
references
References 38 publications
0
7
0
Order By: Relevance
“…IP puzzles [chang Feng et al 2005] are another mechanism hosts can employ to actively defend against spoofing. A server sends an IP puzzle to a client, then the client needs to "solve" the puzzle by performing some computational task.…”
Section: Activementioning
confidence: 99%
“…IP puzzles [chang Feng et al 2005] are another mechanism hosts can employ to actively defend against spoofing. A server sends an IP puzzle to a client, then the client needs to "solve" the puzzle by performing some computational task.…”
Section: Activementioning
confidence: 99%
“…Yet, despite success with Bitcoin and other cryptocurrencies, PoW has not found a widespread application in mitigating malicious behavior in networks. This is despite numerous proposals for PoW-based defenses [37,43,80,90,104,108,126,146,147].…”
Section: Introductionmentioning
confidence: 99%
“…Network puzzles Feng et al [30,31] proposed cryptographically based countermeasure against DoS attacks. When a server comes under attack, it distributes small cryptographic puzzles to the requesting clients.…”
Section: Network Puzzles 3 Protocol Scrubbing and Screeningmentioning
confidence: 99%
“…31 shows the nodes vs utilization to illustrate the nodes left operational at the end indicated by their almost 100% load.TheFigures 4.32, 4.33 and 4.34 show the respective Zone 2 results. We can observe that utilization with sleep/wake are similar between zones.…”
mentioning
confidence: 99%
See 1 more Smart Citation