Defending against an Internet-based attack on the physical world
暂无分享,去创建一个
[1] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[2] Paul F. Syverson,et al. Private Web Browsing , 1997, J. Comput. Secur..
[3] Adam Stubblefield,et al. Using Client Puzzles to Protect TLS , 2001, USENIX Security Symposium.
[4] Moni Naor,et al. VERI CATION OF A HUMAN IN THE LOOP OR IDENTI CATION VIA THE TURING TEST , 1996 .
[5] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[6] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[7] Henry S. Baird,et al. Pessimal print: a reverse Turing test , 2001, Proceedings of Sixth International Conference on Document Analysis and Recognition.
[8] Ari Juels,et al. Client puzzles: A cryptographic defense against connection depletion , 1999 .
[9] Philip D. Zelikow,et al. To assure pride and confidence in the electoral process , 2002 .
[10] Steven M. Bellovin,et al. Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.