@inproceedings{b25484f47c9b4942a71c30e9f4ff3d21,
title = "Efficient Client Puzzle Schemes to Mitigate DoS Attacks",
abstract = "A (computational) client puzzle scheme enables a client to prove to a server that a certain amount of computing resources (CPU cycles and/or Memory look-ups) has been dedicated to solve a puzzle. In a number of different scenarios, researchers have applied client puzzle schemes to mitigate DoS attacks. In this paper, we introduce two batch verification modes for the RSW client puzzle scheme in order to improve the verification efficiency for the server, and investigate three methods for handling incorrect solutions in batch verifications.",
keywords = "METIS-277477, EWI-19185, SCS-Cybersecurity, IR-75366",
author = "Qiang Tang and Arjan Jeckmans",
note = "10.1109/CIS.2010.70 ; International Conference on Computational Intelligence and Security, CIS 2010 ; Conference date: 11-12-2010 Through 14-12-2010",
year = "2010",
month = dec,
doi = "10.1109/CIS.2010.70",
language = "Undefined",
isbn = "978-1-4244-9114-8",
publisher = "IEEE",
pages = "293--297",
booktitle = "International Conference on Computational Intelligence and Security (CIS 2010)",
address = "United States",
}