{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:40:08Z","timestamp":1774366808453,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030117","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"246-256","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":83,"title":["New client puzzle outsourcing techniques for DoS resistance"],"prefix":"10.1145","author":[{"given":"Brent","family":"Waters","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ"}]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[{"name":"RSA Laboratories, Bedford, MA"}]},{"given":"J. Alex","family":"Halderman","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ"}]},{"given":"Edward W.","family":"Felten","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"107","volume-title":"NDSS'03","author":"Abadi M.","year":"2003","unstructured":"M. Abadi , M. Burrows , M. Manasse , and T. Wobber . Moderately hard, memory-bound functions . In NDSS'03 , pages 107 -- 121 . Internet Society , 2003 .]] M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In NDSS'03, pages 107--121. Internet Society, 2003.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"Taming IP packet ooding attacks","author":"Adkins D.","year":"2003","unstructured":"D. Adkins , K. Lakshminarayanan , A. Perrig , and I. Stoica . Taming IP packet ooding attacks . In HotNets-II. ACM Press , 2003 .]] D. Adkins, K. Lakshminarayanan, A. Perrig, and I. Stoica. Taming IP packet ooding attacks. In HotNets-II. ACM Press, 2003.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509969"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Symposium on Internet Technologies and Systems (USITS)","author":"Andersen D. G.","year":"2003","unstructured":"D. G. Andersen . Mayday : Distributed filtering for Internet services . In USENIX Symposium on Internet Technologies and Systems (USITS) , 2003 .]] D. G. Andersen. Mayday: Distributed filtering for Internet services. In USENIX Symposium on Internet Technologies and Systems (USITS), 2003.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972382"},{"key":"e_1_3_2_1_6_1","first-page":"170","volume-title":"8th International Workshop on Security Protocols","author":"Aura T.","year":"2000","unstructured":"T. Aura , P. Nikander , and J. Leiwo . DoS-resistant authentication with client puzzles . In 8th International Workshop on Security Protocols , pages 170 -- 181 . Springer-Verlag , 2000 .]] T. Aura, P. Nikander, and J. Leiwo. DoS-resistant authentication with client puzzles. In 8th International Workshop on Security Protocols, pages 170--181. Springer-Verlag, 2000.]]"},{"key":"e_1_3_2_1_7_1","volume-title":"Hashcash - a denial-of-service countermeasure","author":"Back A.","year":"2002","unstructured":"A. Back . Hashcash - a denial-of-service countermeasure , 2002 . Original system developed in 1997. Manuscript. Referenced 2004 at http:\/\/www.hashcash.org\/hashcash.pdf.]] A. Back. Hashcash - a denial-of-service countermeasure, 2002. Original system developed in 1997. Manuscript. Referenced 2004 at http:\/\/www.hashcash.org\/hashcash.pdf.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"key":"e_1_3_2_1_9_1","volume-title":"ICMP traceback messages","author":"Bellovin S.","year":"2003","unstructured":"S. Bellovin , M. Leech , and T. Taylor . ICMP traceback messages , 2003 . Internet Draft .]] S. Bellovin, M. Leech, and T. Taylor. ICMP traceback messages, 2003. Internet Draft.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_3_2_1_11_1","unstructured":"Wei Dai. Crypto 5.1 benchmarks. Web site at http:\/\/www.eskimo.com\/ weidai\/benchmarks.html.]]  Wei Dai. Crypto 5.1 benchmarks. Web site at http:\/\/www.eskimo.com\/ weidai\/benchmarks.html.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505588"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"10th USENIX Security Symposium","author":"Dean D.","year":"2001","unstructured":"D. Dean and A. Stubblefield . Using client puzzles to protect TLS . In 10th USENIX Security Symposium , pages 1 -- 8 , 2001 .]] D. Dean and A. Stubblefield. Using client puzzles to protect TLS. In 10th USENIX Security Symposium, pages 1--8, 2001.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_15_1","first-page":"426","volume-title":"On memory-bound functions for fighting spam","author":"Dwork C.","year":"2003","unstructured":"C. Dwork , A. Goldberg , and M. Naor . On memory-bound functions for fighting spam . In D. Boneh, editor, CRYPTO '03, pages 426 -- 444 . Springer-Verlag , 2003 .]] C. Dwork, A. Goldberg, and M. Naor. On memory-bound functions for fighting spam. In D. Boneh, editor, CRYPTO '03, pages 426--444. Springer-Verlag, 2003.]]"},{"key":"e_1_3_2_1_16_1","first-page":"139","volume-title":"Pricing via processing or combatting junk mail","author":"Dwork C.","year":"1992","unstructured":"C. Dwork and M. Naor . Pricing via processing or combatting junk mail . In Ernest F. Brickell, editor, CRYPTO '92, pages 139 -- 147 . Springer-Verlag , 1992 .]] C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Ernest F. Brickell, editor, CRYPTO '92, pages 139--147. Springer-Verlag, 1992.]]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/647501.728166"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647502.728317"},{"key":"e_1_3_2_1_19_1","volume-title":"Security Protocols Workshop","author":"Gligor D.","year":"2003","unstructured":"Virgil D. Gligor . Guaranteeing access in spite of service- ooding attacks . In Security Protocols Workshop , 2003 .]] Virgil D. Gligor. Guaranteeing access in spite of service- ooding attacks. In Security Protocols Workshop, 2003.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/647502.728319"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863968"},{"key":"e_1_3_2_1_22_1","first-page":"258","volume-title":"Communications and Multimedia Security","author":"Jakobsson M.","year":"1999","unstructured":"M. Jakobsson and A. Juels . Proofs of work and bread pudding protocols . In Communications and Multimedia Security , pages 258 -- 272 . Kluwer Academic , 1999 .]] M. Jakobsson and A. Juels. Proofs of work and bread pudding protocols. In Communications and Multimedia Security, pages 258--272. Kluwer Academic, 1999.]]"},{"key":"e_1_3_2_1_23_1","first-page":"151","volume-title":"Proceedings of the 1999 ISOC Network and Distributed System Security Symposium","author":"Juels A.","year":"1999","unstructured":"A. Juels and J. Brainard . Client puzzles: A cryptographic countermeasure against connection depletion attacks . In Proceedings of the 1999 ISOC Network and Distributed System Security Symposium , pages 151 -- 165 , 1999 .]] A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the 1999 ISOC Network and Distributed System Security Symposium, pages 151--165, 1999.]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/359460.359473"},{"key":"e_1_3_2_1_27_1","unstructured":"The Netfilter\/Iptables Project. Web site at http:\/\/www.netfilter.org.]]  The Netfilter\/Iptables Project. Web site at http:\/\/www.netfilter.org.]]"},{"key":"e_1_3_2_1_28_1","unstructured":"The GNU MP Project. Web site at http:\/\/www.gnu.org\/software\/gmp\/gmp.html.]]  The GNU MP Project. Web site at http:\/\/www.gnu.org\/software\/gmp\/gmp.html.]]"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"key":"e_1_3_2_1_31_1","volume-title":"The Mathematics of Public-Key Cryptography","author":"Schnorr C.-P.","year":"1999","unstructured":"C.-P. Schnorr and M. Jakobsson . Security of discrete log cryptosystems in the random oracle and generic model . In The Mathematics of Public-Key Cryptography . The Fields Institute , 1999 .]] C.-P. Schnorr and M. Jakobsson. Security of discrete log cryptosystems in the random oracle and generic model. In The Mathematics of Public-Key Cryptography. The Fields Institute, 1999.]]"},{"key":"e_1_3_2_1_32_1","unstructured":"IP Security Protocol Charter. Web site at http:\/\/www.ietf.org\/html.charters\/ipsec-charter.html.]]  IP Security Protocol Charter. Web site at http:\/\/www.ietf.org\/html.charters\/ipsec-charter.html.]]"},{"key":"e_1_3_2_1_33_1","first-page":"878","volume-title":"IEEE INFOCOM","author":"Song D. X.","year":"2001","unstructured":"D. X. Song and A. Perrig . Advanced and authenticated marking schemes for IP traceback . In IEEE INFOCOM , pages 878 -- 886 , 2001 .]] D. X. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. In IEEE INFOCOM, pages 878--886, 2001.]]"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security '00","author":"R. Stone. Center","year":"2000","unstructured":"R. Stone. Center Track : An IP overlay network for tracking DoS oods . In USENIX Security '00 , 2000 .]] R. Stone. CenterTrack: An IP overlay network for tracking DoS oods. In USENIX Security '00, 2000.]]"},{"key":"e_1_3_2_1_35_1","first-page":"294","volume-title":"Eurocrypt '03","author":"von Ahn L.","year":"2003","unstructured":"L. von Ahn , M. Blum , N.J. Hopper , and J. Langford . CAPTCHA: Using hard AI problems for security . In E. Biham, editor, Eurocrypt '03 , pages 294 -- 311 . Springer-Verlag , 2003 .]] L. von Ahn, M. Blum, N.J. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In E. Biham, editor, Eurocrypt '03, pages 294--311. Springer-Verlag, 2003.]]"},{"key":"e_1_3_2_1_36_1","first-page":"78","volume-title":"IEEE Symposium on Security and Privacy","author":"Wang X.","year":"2003","unstructured":"X. Wang and M. K. Reiter . Defending against denial-of-service attacks with puzzle auctions . In IEEE Symposium on Security and Privacy , pages 78 -- 92 , 2003 .]] X. Wang and M. K. Reiter. Defending against denial-of-service attacks with puzzle auctions. In IEEE Symposium on Security and Privacy, pages 78--92, 2003.]]"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830562"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA","acronym":"CCS04","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030117","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":36,"alternative-id":["10.1145\/1030083.1030117","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030117","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}