Hashcash

Results: 43



#Item
1

PDF Document

Add to Reading List

Source URL: www.hashcash.org

- Date: 2005-07-24 00:23:48
    2

    PDF Document

    Add to Reading List

    Source URL: www.hashcash.org

    - Date: 2017-01-07 09:41:34
      3An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

      An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

      Add to Reading List

      Source URL: www.hashcash.org

      Language: English - Date: 2008-06-22 07:14:34
        4STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

        STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

        Add to Reading List

        Source URL: www.hashcash.org

        Language: English - Date: 2014-02-01 12:00:10
          5CPSCExam 2 // December 1, 2011 Answer all of the questions. Please remember to write your name, the course number, and today’s date on all blue books that you submit. This is a closed-book exam; please do n

          CPSCExam 2 // December 1, 2011 Answer all of the questions. Please remember to write your name, the course number, and today’s date on all blue books that you submit. This is a closed-book exam; please do n

          Add to Reading List

          Source URL: zoo.cs.yale.edu

          Language: English - Date: 2011-12-12 14:53:47
          6CPSC – Fall 2011 – Answer Key for Exam 2 Question 1: Privacy and Online Advertising (a) General-interest websites such as http://www.cnn.com would be severely affected. Without behavioral information about us

          CPSC – Fall 2011 – Answer Key for Exam 2 Question 1: Privacy and Online Advertising (a) General-interest websites such as http://www.cnn.com would be severely affected. Without behavioral information about us

          Add to Reading List

          Source URL: zoo.cs.yale.edu

          Language: English - Date: 2011-12-12 14:54:02
          7CentMail: Rate Limiting via Certified Micro-Donations Sharad Goel Jake Hofman  David M. Pennock

          CentMail: Rate Limiting via Certified Micro-Donations Sharad Goel Jake Hofman David M. Pennock

          Add to Reading List

          Source URL: hunch.net

          Language: English - Date: 2009-05-20 11:13:17
          8Hashcash - A Denial of Service Counter-Measure Adam Back e-mail:  1st August 2002 Abstract Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources

          Hashcash - A Denial of Service Counter-Measure Adam Back e-mail: 1st August 2002 Abstract Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources

          Add to Reading List

          Source URL: www.cypherspace.org

          Language: English - Date: 2003-11-23 22:38:09
            9Moderately Hard, Memory-bound Functions Mart´ın Abadi University of California at Santa Cruz Abstract A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending

            Moderately Hard, Memory-bound Functions Mart´ın Abadi University of California at Santa Cruz Abstract A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending

            Add to Reading List

            Source URL: hashcash.org

            Language: English - Date: 2005-01-15 19:23:53