{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:40:34Z","timestamp":1725680434961},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642300530"},{"type":"electronic","value":"9783642300547"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30054-7_15","type":"book-chapter","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T10:42:55Z","timestamp":1337078575000},"page":"184-197","source":"Crossref","is-referenced-by-count":3,"title":["Secure Client Puzzles Based on Random Beacons"],"prefix":"10.1007","author":[{"given":"Yves Igor","family":"Jerschow","sequence":"first","affiliation":[]},{"given":"Martin","family":"Mauve","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/1064340.1064341","volume":"5","author":"M. Abadi","year":"2005","unstructured":"Abadi, M., Burrows, M., Manasse, M., Wobber, T.: Moderately Hard, Memory-bound Functions. ACM Transactions on Internet Technology\u00a05, 299\u2013327 (2005)","journal-title":"ACM Transactions on Internet Technology"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Aura, T., Nikander, P., Leiwo, J.: DOS-Resistant Authentication with Client Puzzles. Revised Papers from the 8th International Workshop on Security Protocols, pp. 170\u2013177 (April 2001)","DOI":"10.1007\/3-540-44810-1_22"},{"key":"15_CR3","unstructured":"Back, A.: Hashcash - A Denial of Service Counter-Measure (August 2002), \n                    \n                      http:\/\/www.hashcash.org\/papers\/hashcash.pdf"},{"key":"15_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-10366-7_30","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"L. Chen","year":"2009","unstructured":"Chen, L., Morrissey, P., Smart, N.P., Warinschi, B.: Security Notions and Generic Constructions for Client Puzzles. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 505\u2013523. Springer, Heidelberg (2009)"},{"key":"15_CR5","unstructured":"Dean, D., Stubblefield, A.: Using Client Puzzles to Protect TLS. In: SSYM 2001: Proceedings of the 10th USENIX Security Symposium (August 2001)"},{"key":"15_CR6","unstructured":"Feng, W.-C., Kaiser, E., Feng, W.-C., Luu, A.: The Design and Implementation of Network Puzzles. In: INFOCOM 2005: Proceedings of the 24th IEEE Conference on Computer Communications, pp. 2372\u20132382 (March 2005)"},{"issue":"5","key":"15_CR7","first-page":"693","volume":"14","author":"H. Hlavacs","year":"2008","unstructured":"Hlavacs, H., Gansterer, W.N., Schabauer, H., Zottl, J., Petraschek, M., Hoeher, T., Jung, O.: Enhancing ZRTP by using Computational Puzzles. Journal of Universal Computer Science\u00a014(5), 693\u2013716 (2008)","journal-title":"Journal of Universal Computer Science"},{"key":"15_CR8","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-540-85855-3_3","volume-title":"Security and Cryptography for Networks","author":"Y.I. Jerschow","year":"2008","unstructured":"Jerschow, Y.I., Lochert, C., Scheuermann, B., Mauve, M.: CLL: A Cryptographic Link Layer for Local Area Networks. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol.\u00a05229, pp. 21\u201338. Springer, Heidelberg (2008)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Jerschow, Y.I., Mauve, M.: Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots. In: ARES 2011: Proceedings of the 6th International Conference on Availability, Reliability and Security, pp. 135\u2013142 (August 2011)","DOI":"10.1109\/ARES.2011.27"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Jerschow, Y.I., Scheuermann, B., Mauve, M.: Counter-Flooding: DoS Protection for Public Key Handshakes in LANs. In: ICNS 2009: Proceedings of the 5th International Conference on Networking and Services, pp. 376\u2013382 (April 2009)","DOI":"10.1109\/ICNS.2009.88"},{"key":"15_CR11","unstructured":"Juels, A., Brainard, J.G.: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In: NDSS 1999: Proceedings of the Network and Distributed System Security Symposium (February 1999)"},{"key":"15_CR12","unstructured":"Lloyd, J.: Botan: a BSD-licensed crypto library for C++, \n                    \n                      http:\/\/botan.randombit.net"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Martinovic, I., Zdarsky, F.A., Wilhelm, M., Wegmann, C., Schmitt, J.B.: Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. In: WiSec 2008: Proceedings of the ACM Conference on Wireless Network Security (March 2008)","DOI":"10.1145\/1352533.1352541"},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1216370.1216373","volume":"39","author":"T. Peng","year":"2007","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Computing Surveys\u00a039(1), 3 (2007)","journal-title":"ACM Computing Surveys"},{"key":"15_CR15","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-540-72738-5_26","volume-title":"Applied Cryptography and Network Security","author":"P. Schaller","year":"2007","unstructured":"Schaller, P., \u010capkun, S., Basin, D.: BAP: Broadcast Authentication Using Cryptographic Puzzles. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 401\u2013419. Springer, Heidelberg (2007)"},{"key":"15_CR16","unstructured":"Tang, Q., Jeckmans, A.: On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. Centre for Telematics and Information Technology, University of Twente (January 2010), \n                    \n                      http:\/\/doc.utwente.nl\/69557\/"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-540-76969-9_16","volume-title":"Cryptology and Network Security","author":"S. Tritilanunt","year":"2007","unstructured":"Tritilanunt, S., Boyd, C., Foo, E., Gonz\u00e1lez Nieto, J.M.: Toward Non-parallelizable Client Puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol.\u00a04856, pp. 247\u2013264. Springer, Heidelberg (2007)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems For Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., Shenker, S.: DDoS Defense by Offense. In: SIGCOMM 2006: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 303\u2013314 (September 2006)","DOI":"10.1145\/1159913.1159948"},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10207-007-0042-x","volume":"7","author":"X. Wang","year":"2008","unstructured":"Wang, X., Reiter, M.K.: A multi-layer framework for puzzle-based denial-of-service defense. International Journal of Information Security\u00a07, 243\u2013263 (2008)","journal-title":"International Journal of Information Security"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Waters, B., Juels, A., Alex Halderman, J., Felten, E.W.: New Client Puzzle Outsourcing Techniques for DoS Resistance. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 246\u2013256 (October 2004)","DOI":"10.1145\/1030083.1030117"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2012"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30054-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:43:01Z","timestamp":1558312981000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30054-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642300530","9783642300547"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30054-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}