Publisher
Springer International Publishing
Reference49 articles.
1. Abadi, M., Burrows, M., Manasse, M., Wobber, T.: Moderately hard, memory-bound functions. ACM Trans. Internet Technol. 5(2), 299–327 (2005)
2. Abhishta, A., Joosten, R., Dragomiretskiy, S., Nieuwenhuis, L.J.M.: Impact of successful DDoS attacks on a major crypto-currency exchange. In: 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 379–384 (2019)
3. Attias, V., Vigneri, L., Dimitrov, V.: Implementation study of two verifiable delay functions. Cryptol. ePrint Arch. 2020, 332 (2020)
4. LNCS;N Atzei,2017
5. Back, A., et al.: Hashcash - a denial of service counter-measure (2002). ftp://sunsite.icm.edu.pl/site/replay.old/programs/hashcash/hashcash.pdf
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献