{"id":"https://openalex.org/W1985328847","doi":"https://doi.org/10.1145/1456508.1456518","title":"Using rhythmic nonces for puzzle-based DoS resistance","display_name":"Using rhythmic nonces for puzzle-based DoS resistance","publication_year":2008,"publication_date":"2008-10-31","ids":{"openalex":"https://openalex.org/W1985328847","doi":"https://doi.org/10.1145/1456508.1456518","mag":"1985328847"},"language":"en","primary_location":{"id":"doi:10.1145/1456508.1456518","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1456508.1456518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM workshop on Computer security architectures","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020552310","display_name":"Ellick Chan","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ellick M. Chan","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, USA","[University of Illinois at Urbana-Champaign, Urbana, USA]"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"[University of Illinois at Urbana-Champaign, Urbana, USA]","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031954035","display_name":"Carl A. Gunter","orcid":"https://orcid.org/0009-0006-6943-0684"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Carl A. Gunter","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, USA","[University of Illinois at Urbana-Champaign, Urbana, USA]"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"[University of Illinois at Urbana-Champaign, Urbana, USA]","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059563876","display_name":"Sonia Jahid","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sonia Jahid","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, USA","[University of Illinois at Urbana-Champaign, Urbana, USA]"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"[University of Illinois at Urbana-Champaign, Urbana, USA]","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009759262","display_name":"Evgeni Peryshkin","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Evgeni Peryshkin","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, USA","[University of Illinois at Urbana-Champaign, Urbana, USA]"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"[University of Illinois at Urbana-Champaign, Urbana, USA]","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051642679","display_name":"Daniel Rebolledo","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Rebolledo","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, USA","[University of Illinois at Urbana-Champaign, Urbana, USA]"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"[University of Illinois at Urbana-Champaign, Urbana, USA]","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020552310"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":4.0977,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.93459823,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"51","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.990347146987915},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.8528401255607605},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7395719289779663},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.60172039270401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5751460194587708},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.554277241230011},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5394479036331177},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49736812710762024},{"id":"https://openalex.org/keywords/forbearance","display_name":"Forbearance","score":0.4807291328907013},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4294831156730652},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4290097653865814},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36613237857818604},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.23561573028564453},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22638803720474243},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10078644752502441}],"concepts":[{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.990347146987915},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.8528401255607605},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7395719289779663},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.60172039270401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5751460194587708},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.554277241230011},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5394479036331177},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49736812710762024},{"id":"https://openalex.org/C120397944","wikidata":"https://www.wikidata.org/wiki/Q3043314","display_name":"Forbearance","level":2,"score":0.4807291328907013},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4294831156730652},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4290097653865814},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36613237857818604},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.23561573028564453},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22638803720474243},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10078644752502441},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1456508.1456518","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1456508.1456518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM workshop on Computer security architectures","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.646.114","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.646.114","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://seclab.illinois.edu/wp-content/uploads/2011/03/ChanGJPR08.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W118842186","https://openalex.org/W182446966","https://openalex.org/W1528601176","https://openalex.org/W1553435762","https://openalex.org/W1675137049","https://openalex.org/W1998350371","https://openalex.org/W2019358670","https://openalex.org/W2092425809","https://openalex.org/W2104692292","https://openalex.org/W2117708768","https://openalex.org/W2121771265","https://openalex.org/W2139693042","https://openalex.org/W2142515424","https://openalex.org/W2156954980","https://openalex.org/W2561675875","https://openalex.org/W4206109607","https://openalex.org/W4237192363","https://openalex.org/W4285719527","https://openalex.org/W4353004773","https://openalex.org/W6637158563","https://openalex.org/W6682696460"],"related_works":["https://openalex.org/W2765230662","https://openalex.org/W199184564","https://openalex.org/W4315630311","https://openalex.org/W1980803971","https://openalex.org/W2594692618","https://openalex.org/W2995980218","https://openalex.org/W2767098552","https://openalex.org/W2892310063","https://openalex.org/W3165237296","https://openalex.org/W2353810166"],"abstract_inverted_index":{"To":[0,43],"protect":[1],"against":[2],"replay":[3],"attacks,":[4],"many":[5],"Internet":[6],"protocols":[7,37],"rely":[8],"on":[9,93],"nonces":[10,20],"to":[11,40,61],"guarantee":[12],"freshness.":[13],"In":[14],"practice,":[15],"the":[16,22,27,50,71,77],"server":[17,28],"generates":[18],"these":[19],"during":[21],"initial":[23],"handshake,":[24],"but":[25],"if":[26],"is":[29,105],"under":[30],"attack,":[31],"resources":[32],"consumed":[33],"by":[34],"managing":[35],"certain":[36],"can":[38],"lead":[39],"DoS":[41,82],"vulnerabilities.":[42],"help":[44],"alleviate":[45],"this":[46,74],"problem,":[47],"we":[48,85],"propose":[49],"concept":[51],"of":[52,73,79,98],"rhythmic":[53],"nonces,":[54],"a":[55,80,99],"cryptographic":[56],"tool":[57],"that":[58,102],"allows":[59],"servers":[60],"measure":[62],"request":[63],"freshness":[64],"with":[65],"minimal":[66],"bookkeeping":[67],"costs.":[68],"We":[69],"explore":[70],"impact":[72],"service":[75],"in":[76],"context":[78],"puzzle-based":[81],"resistance":[83],"scheme":[84,104],"call":[86],"\"SYN":[87],"puzzles\".":[88],"Our":[89],"preliminary":[90],"results":[91],"based":[92],"mathematical":[94],"analysis":[95],"and":[96],"evaluation":[97],"prototype":[100],"suggests":[101],"our":[103],"more":[106],"resistant":[107],"than":[108],"existing":[109],"techniques.":[110]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
