We consider the problem of defending a hash table against a Byzantine
at...
This paper shows how to achieve contention resolution on a shared
commun...
On-demand provisioning in the cloud allows for services to remain availa...
Proof of Work (PoW) based cyberdefense systems require incoming network
...
Binary exponential backoff (BEB) is a decades-old algorithm for coordina...
A Sybil attack occurs when an adversary pretends to be multiple identiti...
Proof-of-work puzzles and CAPTCHAS consume enormous amounts of energy an...
Proof-of-work (PoW) is one of the most common techniques to defend again...
Proof-of-work(PoW) is an algorithmic tool used to secure networks by imp...
For the well-known problem of balls dropped uniformly at random into bin...