{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:58:46Z","timestamp":1742990326338,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475710243"},{"type":"electronic","value":"9780387355849"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/978-0-387-35584-9_16","type":"book-chapter","created":{"date-parts":[[2012,8,10]],"date-time":"2012-08-10T10:37:05Z","timestamp":1344595025000},"page":"263-277","source":"Crossref","is-referenced-by-count":0,"title":["A Client Puzzle Based Public-key Authentication Protocol"],"prefix":"10.1007","author":[{"given":"Chun-Kan","family":"Fung","sequence":"first","affiliation":[]},{"given":"M. C.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"M. Y.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"CERT Coordination Center, \u201cDenial of Service Attacks,\u201d Tech Tips, June 4, 2001. Available: http:\/\/www.cert.org\/tech_tips\/denial_of service.html"},{"key":"16_CR2","volume-title":"IEEE Compute","author":"L Garber","year":"2000","unstructured":"Garber, L., \u201cDenial-of-service attacks rip the internet,\u201d IEEE Computer, vol. 33, Issue 4, pp. 12 \u201417, April 2000."},{"key":"16_CR3","volume-title":"\u201cTowards network denial of service resistant protocols,\u201d in Proceedings of the 15 1h International Information Security Conference (IFIP\/SEC 2000), Beijing","author":"J Leiwo","year":"2000","unstructured":"Jussipekka Leiwo, Pekka Nikander, Tuomas Aura, \u201cTowards network denial of service resistant protocols,\u201d in Proceedings of the 15\n                  1h\n                  International Information Security Conference (IFIP\/SEC 2000), Beijing, China, August 2000. Kluwer."},{"key":"16_CR4","unstructured":"CERT Coordination Center, \u201cTCP SYN Flooding and IP Spoofing Attacks,\u201d CERT Advisory CA-1996\u201321, September 19, 1996. Available: http:\/\/www.cert.org\/advisories\/CA-1996\u201321.html\"http:\/\/www.cert.org\/advisories\/CA-1996\u201321.html\">."},{"key":"16_CR5","first-page":"151","volume-title":"Proceedings of the 1999 Network and Distributed System Security Symposium (NDSS 99)","author":"A Juels","year":"1999","unstructured":"Ari Juels and John Brainard, \u201cClient puzzles: A cryptographic countermeasure against connection depletion attIcks,\u201d in Proceedings of the 1999 Network and Distributed System Security Symposium (NDSS \u201889), pp. 151\u2013165, San Diego, California, February 1999."},{"key":"16_CR6","volume-title":"Internet Draft","author":"AO Freier","year":"1996","unstructured":"Alan O. Freier, Philip Kanton and Paul C. Kocher, \u201cThe SSL Protocol Version 3.0,\u201d Internet Draft, March 1996"},{"key":"16_CR7","first-page":"262","volume-title":"Proceedings of 2000 IEEE International Conference on Networks (ICON 2000)","author":"HN Li","year":"2000","unstructured":"Li Huang Ng and Tan. D.T., \u201cA novel JavaCard-based authentication system for secured transactions on the Internet,\u201d in Proceedings of 2000 IEEE International Conference on Networks (ICON 2000), pp. 262\u2013266, 2000."},{"key":"16_CR8","volume-title":"Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack in Proceedings of the 2nd International Conference on Information and Communication Security (ICICS99), pp.169-182, Sydney","author":"S Hirose","year":"1999","unstructured":"S. Hirose and K. Matsuura, \u201cEnhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack,\u201d in Proceedings of the 2nd International Conference on Information and Communication Security (ICICS\u201999), pp.169\u2013182, Sydney, Australia, November 1999. Springer."},{"key":"16_CR9","first-page":"899","volume-title":"Proceedings of the 1999 Symposium on Cryptography and Information Security (SCIS99), Vol. II","author":"S Hirose","year":"1999","unstructured":"S. Hirose and K. Matsuura, \u201cEnhancing the resistance of a secure key agreement protocol to a denial-of-service attack,\u201d in Proceedings of the 1999 Symposium on Cryptography and Information Security (SCIS\u201999), Vol. II, pp. 899\u2013904, Jan. 1999."},{"key":"16_CR10","first-page":"466","volume-title":"Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA98)","author":"K Matsuura","year":"1998","unstructured":"K. Matsuura and H. Imai, \u201cProtection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack,\u201d in Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA\u201998), pp. 466\u2013470, Oct. 1998."},{"key":"16_CR11","first-page":"1993","volume-title":"editor, Advances in Cryptology - CRYPTO 92, Volume 740 of Lecture Notes in Computer Science, pp. 139-147","author":"C Dwork","year":"1992","unstructured":"Cynthia Dwork and Moni Naor, \u201cPricing via processing or combatting junk mail,\u201d in Ernest F. Brickell, editor, Advances in Cryptology - CRYPTO \u201882, Volume 740 of Lecture Notes in Computer Science, pp. 139\u2013147, 16\u201320 August 1992. Springer-Verlag, 1993."},{"key":"16_CR12","volume-title":"Proceedings of the 8th International Workshop on Security Protocols","author":"T Aura","year":"2000","unstructured":"Tuomas Aura, Pekka Nikander, and Jussipekka Leiwo, \u201cDOS-resistant authentication with client puzzles,\u201d in Bruce Christianson, Bruno Crispo, and Mike Roe, editors, Proceedings of the 8th International Workshop on Security Protocols, Lecture Notes in Computer Science series, Cambridge, UK, April 2000. Springer-Verlag."},{"key":"16_CR13","volume-title":"Fast Software Encryption, Third International Workshop, Volume 1039 of Lecture Notes in Computer Science (D. Gollmann, ed.), pp. 53-69. Springer-Verlag","author":"H Dobbertin","year":"1996","unstructured":"Hans Dobbertin, \u201cCryptanalysis of MD4,\u201d Fast Software Encryption, Third International Workshop, Volume 1039 of Lecture Notes in Computer Science (D. Gollmann, ed.), pp. 53\u201369. Springer-Verlag, 1996."},{"issue":"1","key":"16_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1049\/ip-cdt:19970838","volume":"144","author":"T Coffey","year":"1997","unstructured":"T.Coffey, and P.Saidha, \u201cLogic for verifying public-key cryptographic protocols,\u201d IEE Proceedings in Computers and Digital Techniques, vol. 144, Issue 1, pp. 28\u201332, January 1997.","journal-title":"IEE Proceedings in Computers and Digital Techniques"},{"key":"16_CR15","volume-title":"CRC Press","author":"J Alfred","year":"1997","unstructured":"Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997."},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Dong Hwi Seo and P. Sweeney, \u201cSimple authenticated key agreement algorithm,\u201d IEE Electronics Letters, vol. 35 No. 13, June 1999.","DOI":"10.1049\/el:19990724"}],"container-title":["IFIP Advances in Information and Communication Technology","Smart Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-35584-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T20:27:16Z","timestamp":1557174436000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-35584-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9781475710243","9780387355849"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-35584-9_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2002]]}}}