{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:35Z","timestamp":1750307615600,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456508.1456518","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"51-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Using rhythmic nonces for puzzle-based DoS resistance"],"prefix":"10.1145","author":[{"given":"Ellick M.","family":"Chan","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, USA"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, USA"}]},{"given":"Sonia","family":"Jahid","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, USA"}]},{"given":"Evgeni","family":"Peryshkin","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, USA"}]},{"given":"Daniel","family":"Rebolledo","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"National Solar Observatory\/Sacremento Peak. Images and Current data. http:\/\/nsosp.nso.edu\/data.  National Solar Observatory\/Sacremento Peak. Images and Current data. http:\/\/nsosp.nso.edu\/data."},{"key":"e_1_3_2_1_2_1","unstructured":"USGS Earthquake Hazards Program. Latest earthquakes in the world - past 7 days. http:\/\/earthquake.usgs.gov\/eqcenter\/recentqsww\/Quakes\/quakes all.php.  USGS Earthquake Hazards Program. Latest earthquakes in the world - past 7 days. http:\/\/earthquake.usgs.gov\/eqcenter\/recentqsww\/Quakes\/quakes all.php."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064340.1064341"},{"key":"e_1_3_2_1_4_1","series-title":"Lecture Notes in Computer Science","volume-title":"DOS-resistant Authentication with Client Puzzles. Proceedings of the 8th International Workshop on Security Protocols","author":"Aura T.","year":"2000","unstructured":"T. Aura , P. Nikander , and J. Leiwo . DOS-resistant Authentication with Client Puzzles. Proceedings of the 8th International Workshop on Security Protocols , Lecture Notes in Computer Science , Cambridge , UK , April , 2000 . T. Aura, P. Nikander, and J. Leiwo. DOS-resistant Authentication with Client Puzzles. Proceedings of the 8th International Workshop on Security Protocols, Lecture Notes in Computer Science, Cambridge, UK, April, 2000."},{"key":"e_1_3_2_1_5_1","unstructured":"A. Back. Hashcash - A Denial of Service Countermeasure. http:\/\/www.hashcash.org\/hashcash.pdf 2002.  A. Back. Hashcash - A Denial of Service Countermeasure. http:\/\/www.hashcash.org\/hashcash.pdf 2002."},{"key":"e_1_3_2_1_6_1","volume-title":"Usenix","author":"Dean D.","year":"2001","unstructured":"D. Dean and A. Stubblefield . Using Client Puzzles to Protect TLS . Usenix , 2001 . D. Dean and A. Stubblefield. Using Client Puzzles to Protect TLS. Usenix, 2001."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_7"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007)","author":"Douligeris C.","year":"2007","unstructured":"C. Douligeris and A. Mitrokotsa . Denial-of-Service Challenges from Oblivious Online Sources . Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007) , 2007 . C. Douligeris and A. Mitrokotsa. Denial-of-Service Challenges from Oblivious Online Sources. Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), 2007."},{"volume-title":"Ecrypt yearly report on algorithms and keysizes","year":"2006","key":"e_1_3_2_1_9_1","unstructured":"European Network of Excellence for Cryptology. Ecrypt yearly report on algorithms and keysizes 2006 . European Network of Excellence for Cryptology. Ecrypt yearly report on algorithms and keysizes 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315287"},{"key":"e_1_3_2_1_11_1","first-page":"151","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Juels A.","year":"1999","unstructured":"A. Juels and J. Brainard . Client puzzles: A Cryptographic Countermeasure against Connection Depletion Attacks . Proceedings of the Network and Distributed System Security Symposium , pages 151 -- 165 , 1999 . A. Juels and J. Brainard. Client puzzles: A Cryptographic Countermeasure against Connection Depletion Attacks. Proceedings of the Network and Distributed System Security Symposium, pages 151--165, 1999."},{"key":"e_1_3_2_1_12_1","volume-title":"A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms","author":"Mirkovic J.","year":"2001","unstructured":"J. Mirkovic , J. Martin , and P. Reiher . A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms , 2001 . J. Mirkovic, J. Martin, and P. Reiher. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms, 2001."},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology (CRYPTO 04)","author":"Moran T.","year":"2004","unstructured":"T. Moran , R. Shaltiel , and A. Ta-Shma . Non-interactive timestamping in the bounded storage model . In Advances in Cryptology (CRYPTO 04) , volume 3152 of Lecture Notes in Computer Science . Springer , December 2004 . T. Moran, R. Shaltiel, and A. Ta-Shma. Non-interactive timestamping in the bounded storage model. In Advances in Cryptology (CRYPTO 04), volume 3152 of Lecture Notes in Computer Science. Springer, December 2004."},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE Symposium on Security and Privacy, 3","author":"Wang X.","year":"2003","unstructured":"X. Wang and M. Reiter . Defending against Denial-of-Service Attacks with Puzzle Auctions . IEEE Symposium on Security and Privacy, 3 , 2003 . X. Wang and M. Reiter. Defending against Denial-of-Service Attacks with Puzzle Auctions. IEEE Symposium on Security and Privacy, 3, 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030117"}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 2nd ACM workshop on Computer security architectures"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456508.1456518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456508.1456518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:44Z","timestamp":1750250744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456508.1456518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":15,"alternative-id":["10.1145\/1456508.1456518","10.1145\/1456508"],"URL":"https:\/\/doi.org\/10.1145\/1456508.1456518","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}