ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1904.10164
  4. Cited By
Foundations, Properties, and Security Applications of Puzzles: A Survey

Foundations, Properties, and Security Applications of Puzzles: A Survey

23 April 2019
I. M. Ali
Maurantonio Caprolu
Roberto Di Pietro
ArXivPDFHTML

Papers citing "Foundations, Properties, and Security Applications of Puzzles: A Survey"

11 / 11 papers shown
Title
Bankrupting DoS Attackers
Bankrupting DoS Attackers
Trisha Chakraborty
A. Najmul Islam
Valerie King
D. Rayborn
Jared Saia
Maxwell Young
AAML
88
2
0
17 May 2022
Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking
  Detection
Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking Detection
Maurantonio Caprolu
Simone Raponi
Gabriele Oligeri
Roberto Di Pietro
49
43
0
21 Oct 2019
Revisiting Client Puzzles for State Exhaustion Attacks Resilience
Revisiting Client Puzzles for State Exhaustion Attacks Resilience
Mohammad A. Noureddine
Ahmed M. Fawaz
Tamer Basar
W. Sanders
25
8
0
31 Jul 2018
A Survey on Consensus Mechanisms and Mining Strategy Management in
  Blockchain Networks
A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks
Wenbo Wang
D. Hoang
Peizhao Hu
Zehui Xiong
Dusit Niyato
Ping Wang
Yonggang Wen
Dong In Kim
52
749
0
07 May 2018
The Impact of Quantum Computing on Present Cryptography
The Impact of Quantum Computing on Present Cryptography
Vasileios Mavroeidis
Kamer Vishi
Mateusz Zych
A. Jøsang
55
250
0
31 Mar 2018
Blockchain-based Proof of Location
Blockchain-based Proof of Location
G. Brambilla
Michele Amoretti
Francesco Medioli
F. Zanichelli
35
58
0
01 Jul 2016
Egalitarian computing
Egalitarian computing
A. Biryukov
D. Khovratovich
FedML
8
25
0
11 Jun 2016
RAPTOR: Routing Attacks on Privacy in Tor
RAPTOR: Routing Attacks on Privacy in Tor
Yixin Sun
A. Edmundson
Laurent Vanbever
Oscar Li
Jennifer Rexford
M. Chiang
Prateek Mittal
54
222
0
13 Mar 2015
Majority is not Enough: Bitcoin Mining is Vulnerable
Majority is not Enough: Bitcoin Mining is Vulnerable
Ittay Eyal
E. G. Sirer
91
1,240
0
01 Nov 2013
SybilControl: Practical Sybil Defense with Computational Puzzles
SybilControl: Practical Sybil Defense with Computational Puzzles
Frank H. Li
Prateek Mittal
M. Caesar
Nikita Borisov
AAML
49
67
0
12 Jan 2012
A New Bound on the Performance of the Bandwidth Puzzle
A New Bound on the Performance of the Bandwidth Puzzle
Zhenghao Zhang
61
4
0
18 Feb 2011
1