1. Moderately hard, memory-bound functions;Abadi;ACM Trans. Internet Technol.,2005
2. Foundations, properties, and security applications of puzzles: a survey;Ali;ACM Comput. Surv.,2020
3. AdIDoS–adaptive and intelligent fully-automatic detection of denial-of-service weaknesses in web services;Altmeier,2016
4. Redesigning the string hash table, burst trie, and BST to exploit cache;Askitis;ACM J. Exp. Algorithmics,2011
5. Skip graphs;Aspnes,2003