{"id":"https://openalex.org/W4400410175","doi":"https://doi.org/10.3390/cryptography8030030","title":"Improve Parallel Resistance of Hashcash Tree","display_name":"Improve Parallel Resistance of Hashcash Tree","publication_year":2024,"publication_date":"2024-07-08","ids":{"openalex":"https://openalex.org/W4400410175","doi":"https://doi.org/10.3390/cryptography8030030"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography8030030","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030030","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/cryptography8030030","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039882261","display_name":"Mario Alviano","orcid":"https://orcid.org/0000-0002-2052-2063"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Mario Alviano","raw_affiliation_strings":["Department of Mathematics and Computer Science, University of Calabria, 87036 Rende, Italy"],"raw_orcid":"https://orcid.org/0000-0002-2052-2063","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, University of Calabria, 87036 Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115489955","display_name":"Giada Gabriele","orcid":null},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giada Gabriele","raw_affiliation_strings":["Department of Mathematics and Computer Science, University of Calabria, 87036 Rende, Italy"],"raw_orcid":"https://orcid.org/0009-0003-6136-9901","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, University of Calabria, 87036 Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039882261"],"corresponding_institution_ids":["https://openalex.org/I45204951"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10244855,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"3","first_page":"30","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resistance","display_name":"Resistance (ecology)","score":0.596044659614563},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4058961868286133},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.36938995122909546},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.24671286344528198},{"id":"https://openalex.org/keywords/agronomy","display_name":"Agronomy","score":0.10731899738311768}],"concepts":[{"id":"https://openalex.org/C57473165","wikidata":"https://www.wikidata.org/wiki/Q7315604","display_name":"Resistance (ecology)","level":2,"score":0.596044659614563},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4058961868286133},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.36938995122909546},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.24671286344528198},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.10731899738311768}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography8030030","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030030","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7f12efa4484d4492aa1638bdce8fe52e","is_oa":true,"landing_page_url":"https://doaj.org/article/7f12efa4484d4492aa1638bdce8fe52e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 8, Iss 3, p 30 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography8030030","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030030","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W118842186","https://openalex.org/W1492996310","https://openalex.org/W1597159947","https://openalex.org/W1601379374","https://openalex.org/W1681659085","https://openalex.org/W1716847186","https://openalex.org/W1998350371","https://openalex.org/W2092425809","https://openalex.org/W2139693042","https://openalex.org/W2165688615","https://openalex.org/W2184720590","https://openalex.org/W2586064391","https://openalex.org/W2738679187","https://openalex.org/W2775195841","https://openalex.org/W3066421834","https://openalex.org/W3126276480","https://openalex.org/W3172538446","https://openalex.org/W4283466292","https://openalex.org/W4311331175","https://openalex.org/W4313516700","https://openalex.org/W4313531834","https://openalex.org/W4387259453","https://openalex.org/W4392520144"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Denial":[0],"of":[1,33,41,59,79,115,123,137],"Service":[2],"(DoS)":[3],"attacks":[4,29],"remain":[5],"a":[6,44,56,86,95,120],"persistent":[7],"threat":[8],"to":[9,143],"online":[10],"systems,":[11],"necessitating":[12],"continual":[13],"innovation":[14],"in":[15,85],"defense":[16],"mechanisms.":[17],"In":[18],"this":[19],"work,":[20],"we":[21,54,93],"present":[22],"an":[23],"improved":[24],"algorithm":[25],"for":[26],"mitigating":[27],"DoS":[28,153],"through":[30],"the":[31,39,60,77,82,90,108,113,135],"augmentation":[32],"client":[34],"puzzle":[35,146],"protocols.":[36],"Building":[37],"upon":[38],"foundation":[40],"hashcash":[42,50,117],"trees,":[43,53,118],"recently":[45],"proposed":[46],"data":[47,61],"structure":[48,62],"combining":[49],"and":[51,81,126],"Merkle":[52],"introduce":[55],"new":[57],"version":[58],"that":[63,99],"enhances":[64],"resistance":[65],"against":[66,129,152],"parallel":[67,101],"computation":[68],"(a":[69],"common":[70],"tactic":[71],"employed":[72],"by":[73],"attackers).":[74],"By":[75],"incorporating":[76],"labels":[78],"children":[80],"next":[83,109],"node":[84,102,110],"breadth-first":[87],"traversal":[88],"into":[89],"hash":[91],"function,":[92],"establish":[94],"sequential":[96],"processing":[97],"order":[98],"inhibits":[100],"evaluation.":[103],"The":[104],"added":[105],"dependency":[106],"on":[107],"significantly":[111],"elevates":[112],"complexity":[114],"constructing":[116],"introducing":[119],"linear":[121],"number":[122],"synchronization":[124],"points":[125],"fortifying":[127],"resilience":[128],"potential":[130],"attacks.":[131],"Empirical":[132],"evaluation":[133],"demonstrates":[134],"efficacy":[136],"our":[138],"approach,":[139],"showcasing":[140],"its":[141],"ability":[142],"accurately":[144],"control":[145],"difficulty":[147],"while":[148],"bolstering":[149],"system":[150],"security":[151],"threats.":[154]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
