{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T16:10:30Z","timestamp":1740067830757,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642128264"},{"type":"electronic","value":"9783642128271"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12827-1_26","type":"book-chapter","created":{"date-parts":[[2010,5,5]],"date-time":"2010-05-05T19:15:11Z","timestamp":1273086911000},"page":"359-376","source":"Crossref","is-referenced-by-count":10,"title":["Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles"],"prefix":"10.1007","author":[{"given":"Harikrishna","family":"Narasimhan","sequence":"first","affiliation":[]},{"given":"Venkatanathan","family":"Varadarajan","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"26_CR1","first-page":"145","volume":"5","author":"A. Agah","year":"2007","unstructured":"Agah, A., Das, S.K.: Preventing dos attacks in wireless sensor networks: A repeated game theory approach. International Journal of Network Security\u00a05(2), 145\u2013153 (2007)","journal-title":"International Journal of Network Security"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-44810-1_22","volume-title":"Security Protocols","author":"T. Aura","year":"2001","unstructured":"Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol.\u00a02133, pp. 170\u2013177. Springer, Heidelberg (2001)"},{"key":"26_CR3","unstructured":"Bencsath, B., Vajda, I., Buttyan, L.: A game based analysis of the client puzzle approach to defend against dos attacks. In: Proceedings of the 2003 International Conference on Software, Telecommunications and Computer Networks, pp. 763\u2013767 (2003)"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 139\u2013147. Springer, Heidelberg (1993)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Fallah, M.: A puzzle-based defense strategy against flooding attacks using game theory. IEEE Transactions on Dependable and Secure Computing\u00a099(2), 5555","DOI":"10.1109\/TDSC.2008.13"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Feng, W., Kaiser, E., Luu, A.: Design and implementation of network puzzles. In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, March 2005, vol.\u00a04, pp. 2372\u20132382 (2005)","DOI":"10.1109\/INFCOM.2005.1498523"},{"issue":"3","key":"26_CR7","doi-asserted-by":"publisher","first-page":"533","DOI":"10.2307\/1911307","volume":"54","author":"D. Fudenberg","year":"1986","unstructured":"Fudenberg, D., Maskin, E.: The folk theorem in repeated games with discounting or with incomplete information. Econometrica\u00a054(3), 533\u2013554 (1986)","journal-title":"Econometrica"},{"key":"26_CR8","unstructured":"Juels, A., Brainard, J.: Client puzzles: A cryptographic countermeasure against connection depletion attacks. In: Proceedings of NDSS 1999 (Networks and Distributed Security Systems), pp. 151\u2013165 (1999)"},{"key":"26_CR9","first-page":"31","volume-title":"Vehicular Technology Conference, VTC Spring 2008.","author":"K. Komathy","year":"2008","unstructured":"Komathy, K., Narayanasamy, P.: Secure data forwarding against denial of service attack using trust based evolutionary game. In: Vehicular Technology Conference, VTC Spring 2008., pp. 31\u201335. IEEE, Los Alamitos (2008)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Lv, J.-J.: A game theoretic defending model with puzzle controller for distributed dos attack prevention. In: 2008 International Conference on Machine Learning and Cybernetics, July 2008, vol.\u00a02, pp. 1064\u20131069 (2008)","DOI":"10.1109\/ICMLC.2008.4620562"},{"key":"26_CR11","first-page":"287","volume-title":"CSFW 2005: Proceedings of the 18th IEEE workshop on Computer Security Foundations","author":"A. Mahimkar","year":"2005","unstructured":"Mahimkar, A., Shmatikov, V.: Game-based analysis of denial-of-service prevention protocols. In: CSFW 2005: Proceedings of the 18th IEEE workshop on Computer Security Foundations, pp. 287\u2013301. IEEE Computer Society, Washington (2005)"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Narasimhan, H., Varadarajan, V., Pandu Rangan, C.: Game theoretic resistance to denial of service attacks using hidden difficulty puzzles. Cryptology ePrint Archive, Report 2009\/350 (2009), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-12827-1_26"},{"key":"26_CR13","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical report, Cambridge, MA, USA (1996)"},{"issue":"5","key":"26_CR14","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/s11276-007-0088-8","volume":"15","author":"Y.E. Sagduyu","year":"2009","unstructured":"Sagduyu, Y.E., Ephremides, A.: A game-theoretic analysis of denial of service attacks in wireless random access. Wireless Networks\u00a015(5), 651\u2013666 (2009)","journal-title":"Wireless Networks"},{"key":"26_CR15","unstructured":"Smith, J.: Denial of Service: Prevention, Modelling and Detection. PhD thesis, Queensland University of Technology, Brisbane, QLD 4001 Australia (June 2007)"},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-540-76969-9_16","volume-title":"Cryptology and Network Security","author":"S. Tritilanunt","year":"2007","unstructured":"Tritilanunt, S., Boyd, C., Foo, E., Nieto, J.G.: Toward non-parallelizable cryptographic puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol.\u00a04856, pp. 247\u2013264. Springer, Heidelberg (2007)"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-540-79104-1_14","volume-title":"Information Security Practice and Experience","author":"P.P. Tsang","year":"2008","unstructured":"Tsang, P.P., Smith, S.W.: Combating spam and denial-of-service attacks with trusted puzzle solvers. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol.\u00a04991, pp. 188\u2013202. Springer, Heidelberg (2008)"},{"key":"26_CR18","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/SECPRI.2003.1199329","volume-title":"SP 2003: Proceedings of the 2003 IEEE Symposium on Security and Privacy","author":"X.F. Wang","year":"2003","unstructured":"Wang, X.F., Reiter, M.K.: Defending against denial-of-service attacks with puzzle auctions. In: SP 2003: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 78. IEEE Computer Society, Washington (2003)"},{"key":"26_CR19","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1145\/1030083.1030117","volume-title":"CCS 2004: Proceedings of the 11th ACM conference on Computer and Communications Security","author":"B. Waters","year":"2004","unstructured":"Waters, B., Juels, A., Alex Halderman, J., Felten, E.W.: New client puzzle outsourcing techniques for dos resistance. In: CCS 2004: Proceedings of the 11th ACM conference on Computer and Communications Security, pp. 246\u2013256. ACM, New York (2004)"},{"key":"26_CR20","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/1533057.1533070","volume-title":"ASIACCS 2009: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security","author":"R. Zhang","year":"2009","unstructured":"Zhang, R., Hanaoka, G., Imai, H.: A generic construction of useful client puzzles. In: ASIACCS 2009: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 70\u201379. ACM, New York (2009)"}],"container-title":["Lecture Notes in Computer Science","Information Security, Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12827-1_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T15:37:27Z","timestamp":1740065847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12827-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642128264","9783642128271"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12827-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}