-
1Academic Journal
المؤلفون: Bitansky, Nir, Solomon, Tomer
المساهمون: Nir Bitansky and Tomer Solomon
مصطلحات موضوعية: Fully Homomorphic Encryption, Polynomial Assumptions, Cryptographic Puzzles
وصف الملف: application/pdf
Relation: Is Part Of LIPIcs, Volume 251, 14th Innovations in Theoretical Computer Science Conference (ITCS 2023); https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.17
-
2Academic Journal
مصطلحات موضوعية: Cryptographic puzzles, Distance-bounding protocols, RFID security, Protocols, Traceability, Informática
وصف الملف: application/pdf
Relation: http://dx.doi.org/10.1007/s00779-011-0396-y; Personal and Ubiquitous Computing, (March 2012), 16(3), 351-365.; http://hdl.handle.net/10016/11707; 351; 365; Personal and Ubiquitous Computing; 16
-
3Academic Journal
المؤلفون: Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, Gonzalez Nieto, Juan
المصدر: Lecture Notes in Computer Science
مصطلحات موضوعية: Client Puzzles, Cryptographic Puzzles, Denial of Service Attacks, Non-Parallelizable
وصف الملف: application/pdf
Relation: https://eprints.qut.edu.au/15210/1/15210.pdf; Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan (2007) Toward Non-Parallelizable Client Puzzles. Lecture Notes in Computer Science, 4856, Article number: CANS 247-264.; https://eprints.qut.edu.au/15210/; School of Software Engineering & Data Communications; Information Security Institute; Science & Engineering Faculty; Australian Research Centre for Aerospace Automation
الاتاحة: https://eprints.qut.edu.au/15210/
-
4Academic Journal
المؤلفون: Vasan Sai Krishna, C., Bhuvana, Y., Pavan Kumar, P., Murugan, R.
المصدر: International Journal of Engineering & Technology; Vol. 7 No. 1.1 (2018): Special Issue 1; 230-233 ; 2227-524X ; 10.14419/ijet.v7i1.1
مصطلحات موضوعية: Distributed Denial of Service Attacks (DDoS), Client Puzzle Mechanism, Cryptographic Puzzles, Authentication
وصف الملف: application/pdf
Relation: http://www.sciencepubco.com/index.php/ijet/article/view/9473/3592; http://www.sciencepubco.com/index.php/ijet/article/view/9473
-
5Book
المساهمون: Mu, Y, Susilo, W, Seberry, J
المصدر: Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Proceedings [Lecture Notes in Computer Science, Volume 7372]
مصطلحات موضوعية: Cryptographic puzzles, Difficulty, Key escrow, Timed release encryption
Relation: Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan, & Kuppusamy, Lakshmi (2012) Effort-release public-key encryption from cryptographic puzzles. In Mu, Y, Susilo, W, & Seberry, J (Eds.) Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Proceedings [Lecture Notes in Computer Science, Volume 7372]. Springer, Germany, pp. 194-207.; https://eprints.qut.edu.au/51573/; Science & Engineering Faculty
الاتاحة: https://eprints.qut.edu.au/51573/
-
6Book
المؤلفون: Raghavan, S., Dawson, Ed
المساهمون: Dawson, E, Raghavan, S V
المصدر: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection
مصطلحات موضوعية: Technical and legal issues of Denial of Service attacks, cryptographic puzzles, distributed Denial of Service, high rate flooding attacks, testbed
Relation: Raghavan, S. & Dawson, Ed (2011) Introduction. In Dawson, E & Raghavan, S V (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 1-7.; https://eprints.qut.edu.au/81199/; Institute for Future Environments; Science & Engineering Faculty
الاتاحة: https://eprints.qut.edu.au/81199/
-
7
المصدر: Personal and Ubiquitous Computing, 16(3)2012
e-Archivo. Repositorio Institucional de la Universidad Carlos III de Madrid
instnameمصطلحات موضوعية: QA75, Identification scheme, Computer science, Mobile computing, Cryptography, Management Science and Operations Research, Computer security, computer.software_genre, privacy, WSBC, Protocol (object-oriented programming), Informática, Cryptographic puzzles, Database, cryptographic puzzles, business.industry, distance-bounding protocols, Distance-bounding protocols, Traceability, Cryptographic protocol, RFID security, Computer Science Applications, Identification (information), traceability, Hardware and Architecture, Key (cryptography), business, computer, Protocols
وصف الملف: application/pdf
-
8Dissertation/ Thesis
المؤلفون: Rangasamy, Jothi Ramalingam
مصطلحات موضوعية: denial-of-service, denial-of-service resilience, cryptographic puzzles, time-lock puzzles, puzzle-unforgeability, puzzle-diculty, non-parallelisability, mutual authentication, bernstein's signatures, secure sockets layer (ssl), public-key encryptionript, timed-release encryption, key encapsulation mechanism, data encapsulation mechanism, encapsulated key escrow, ciphertext indistinguishability under chosen plaintext attacks and adaptive chosen ciphertext attacks, random Oracle model, standard model
وصف الملف: application/pdf
Relation: https://eprints.qut.edu.au/61007/1/Jothi_Rangasamy_Thesis.pdf; Rangasamy, Jothi Ramalingam (2012) Cryptographic techniques for managing computational effort. PhD thesis, Queensland University of Technology.; https://eprints.qut.edu.au/61007/; Faculty of Science and Technology; Information Security Institute
الاتاحة: https://eprints.qut.edu.au/61007/
-
9Electronic Resource
مصطلحات الفهرس: Fully Homomorphic Encryption, Polynomial Assumptions, Cryptographic Puzzles, InProceedings, Text, doc-type:ResearchArticle, publishedVersion
URL:
https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2023.17
Is Part Of LIPIcs, Volume 251, 14th Innovations in Theoretical Computer Science Conference (ITCS 2023) -
10Electronic Resource
المؤلفون: Mu, Y, Susilo, W, Seberry, J, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan, Kuppusamy, Lakshmi
المصدر: Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Proceedings [Lecture Notes in Computer Science, Volume 7372]
مصطلحات الفهرس: Cryptographic puzzles, Difficulty, Key escrow, Timed release encryption, Chapter in Book, Report or Conference volume
URL: doi:10.1007/978-3-642-31448-3_15
Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan, & Kuppusamy, Lakshmi (2012) Effort-release public-key encryption from cryptographic puzzles. In Mu, Y, Susilo, W, & Seberry, J (Eds.) Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Proceedings [Lecture Notes in Computer Science, Volume 7372]. Springer, Germany, pp. 194-207. -
11Electronic Resource
المؤلفون: Dawson, E, Raghavan, S V, Raghavan, S., Dawson, Ed
المصدر: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection
مصطلحات الفهرس: Technical and legal issues of Denial of Service attacks, cryptographic puzzles, distributed Denial of Service, high rate flooding attacks, testbed, Chapter in Book, Report or Conference volume
URL: doi:10.1007/978-81-322-0277-6_1
Raghavan, S. & Dawson, Ed (2011) Introduction. In Dawson, E & Raghavan, S V (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 1-7. -
12Electronic Resource
المؤلفون: Peris-Lopez, P. (author), Orfila, A. (author), Palomar, E. (author), Hernandez-Castro, J.C. (author)
مصطلحات الفهرس: RFID security, WSBC, cryptographic puzzles, distance-bounding protocols, privacy, traceability, journal article, Text
URL:
http://resolver.tudelft.nl/uuid:c79b6170-e026-44c7-8215-55c2fce87527
Personal and Ubiquitous Computing, 16(3)2012--1617-4917