{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T02:45:31Z","timestamp":1722912331877},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/iscc.2011.5983934","type":"proceedings-article","created":{"date-parts":[[2011,8,16]],"date-time":"2011-08-16T19:24:01Z","timestamp":1313522641000},"source":"Crossref","is-referenced-by-count":1,"title":["DISPUTE: Distributed puzzle tussle"],"prefix":"10.1109","author":[{"given":"A.","family":"Lukyanenko","sequence":"first","affiliation":[]},{"given":"A.","family":"Gurtov","sequence":"additional","affiliation":[]},{"given":"A.","family":"Yla-Jaaski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","author":"cormen","year":"2001","journal-title":"Introduction to Algorithms"},{"key":"14","author":"krishna","year":"2002","journal-title":"Auction Theory"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2010.5546781"},{"key":"12","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1145\/1159913.1159948","article-title":"DDoS defense by offense","author":"walfish","year":"2006","journal-title":"SIGCOMM '06 Proceedings of the 2006 Conference on Applications Technologies Architectures and Protocols for Computer Communications (New York NY USA)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"key":"2","author":"jordan robertson","year":"0","journal-title":"Authorities Bust 3 in Infection of 13m Computers"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"10","author":"ted samson","year":"0","journal-title":"Amazon EC2 Enables Brute-force Attacks on the Cheap"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/9780470772898"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44810-1_22"},{"key":"5","first-page":"151","article-title":"Client puzzles: A cryptographic countermeasure against connection depletion attacks","author":"juels","year":"1999","journal-title":"NDSS '99 Proceedings of 1999 Network and Distributed Systems Security Symposium (San Diego CA USA)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1366919.1366925"},{"key":"8","year":"0","journal-title":"Host Identity Protocol (HIP) IETF Working Group"}],"event":{"name":"2011 IEEE Symposium on Computers and Communications (ISCC)","location":"Corfu, Greece","start":{"date-parts":[[2011,6,28]]},"end":{"date-parts":[[2011,7,1]]}},"container-title":["2011 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5975307\/5983788\/05983934.pdf?arnumber=5983934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T04:48:09Z","timestamp":1497934089000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5983934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iscc.2011.5983934","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}