يعرض 1 - 12 نتائج من 12 نتيجة بحث عن '"cryptographic puzzles"', وقت الاستعلام: 0.38s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
    Academic Journal
  3. 3
    Academic Journal

    المصدر: Lecture Notes in Computer Science

    وصف الملف: application/pdf

    Relation: https://eprints.qut.edu.au/15210/1/15210.pdf; Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan (2007) Toward Non-Parallelizable Client Puzzles. Lecture Notes in Computer Science, 4856, Article number: CANS 247-264.; https://eprints.qut.edu.au/15210/; School of Software Engineering & Data Communications; Information Security Institute; Science & Engineering Faculty; Australian Research Centre for Aerospace Automation

  4. 4
    Academic Journal
  5. 5
    Book

    المساهمون: Mu, Y, Susilo, W, Seberry, J

    المصدر: Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Proceedings [Lecture Notes in Computer Science, Volume 7372]

    Relation: Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan, & Kuppusamy, Lakshmi (2012) Effort-release public-key encryption from cryptographic puzzles. In Mu, Y, Susilo, W, & Seberry, J (Eds.) Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Proceedings [Lecture Notes in Computer Science, Volume 7372]. Springer, Germany, pp. 194-207.; https://eprints.qut.edu.au/51573/; Science & Engineering Faculty

  6. 6
    Book

    المؤلفون: Raghavan, S., Dawson, Ed

    المساهمون: Dawson, E, Raghavan, S V

    المصدر: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection

    Relation: Raghavan, S. & Dawson, Ed (2011) Introduction. In Dawson, E & Raghavan, S V (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 1-7.; https://eprints.qut.edu.au/81199/; Institute for Future Environments; Science & Engineering Faculty

  7. 7
  8. 8
    Dissertation/ Thesis
  9. 9
    Electronic Resource
  10. 10
    Electronic Resource

    المصدر: Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Proceedings [Lecture Notes in Computer Science, Volume 7372]

    URL: doi:10.1007/978-3-642-31448-3_15
    Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan, & Kuppusamy, Lakshmi (2012) Effort-release public-key encryption from cryptographic puzzles. In Mu, Y, Susilo, W, & Seberry, J (Eds.) Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Proceedings [Lecture Notes in Computer Science, Volume 7372]. Springer, Germany, pp. 194-207.

  11. 11
    Electronic Resource

    المصدر: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection

    URL: doi:10.1007/978-81-322-0277-6_1
    Raghavan, S. & Dawson, Ed (2011) Introduction. In Dawson, E & Raghavan, S V (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 1-7.

  12. 12
    Electronic Resource