Sign in

Using proof-of-work to mitigate spoofing-based denial of service attacks.

Samuel DeLaughterKaren R. Sollins
Published in: StudentWorkshop@CoNEXT (2021)
Keyphrases