Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,059,004 papers from all fields of science
Search
Sign In
Create Free Account
Hashcash
Known as:
Hash cash
Hashcash is a proof-of-work system used to limit email spam and denial-of-service attacks, and more recently has become known for its use in bitcoin…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Bitcoin
Blog
Botnet
Byzantine fault tolerance
Expand
Broader (1)
Email authentication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Network Security Final Report Memory Bound Client Puzzles
R. Das
,
S. Doshi
2020
Corpus ID: 10571934
Client puzzles are computable cryptographic problems used to defend against connection depletion attacks [6]. These are…
Expand
2018
2018
Inflation Propensity of Collatz Orbits: A New Proof-of-Work for Blockchain Applications
Fabian Bocart
Journal of Risk and Financial Management
2018
Corpus ID: 53335468
Cryptocurrencies such as Bitcoin rely on a proof-of-work system to validate transactions and prevent attacks or double-spending…
Expand
2015
2015
Revisiting Block Withholding Attack in Bitcoin Cryptocurrency Samiran Bag
S. Ruj
,
K. Sakurai
2015
Corpus ID: 59355360
This paper deals with a variant of block withholding attack. Here, we analyze the strategies of a selfish Bitcoin miner who in…
Expand
2014
2014
Out-of-Band Authentication Model with Hashcash Brute-Force Prevention
George C. Violaris
,
I. Dionysiou
IEEE Intl Conf on High Performance Computing and…
2014
Corpus ID: 16756016
Successful out-of-band authentication in popular languages such as PHP has proven to be problematic and in many ways unsafe as…
Expand
2014
2014
Hashcash-A Denial of Service Counter-Measure Adam Back
Adam Back
2014
Corpus ID: 15990474
Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources such as email, and…
Expand
2007
2007
Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
K. Curran
,
J. Honan
2007
Corpus ID: 64003867
This chapter investigates the problem of e-mail spam, and identifies methods to minimise the volumes. The analysis focuses on the…
Expand
2006
2006
Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution
K. Curran
,
J. Honan
Information Security Journal
2006
Corpus ID: 207046639
Abstract Spam can be defined as unsolicited e- mail, often of a commercial nature, sent indiscriminately to multiple mailing…
Expand
2005
2005
Addressing Spam E-Mail Using Hashcast
K. Curran
,
J. Honan
International Journal of Business Data…
2005
Corpus ID: 31574160
This paper investigates the problem of e-mail spam and identifies methods to efficiently minimize the volumes. It is argued that…
Expand
2004
2004
Trustworthy Routing with the TORA Protocol
A. Pirzada
,
A. Datta
,
C. McDonald
2004
Corpus ID: 16883777
Ad-hoc networks are made up of one or more low power mobile wireless nodes. These nodes are able to communicate over a wide range…
Expand
2002
2002
Technical Solutions for Controlling Spam
Shane Hird
2002
Corpus ID: 17882414
As the commercialisation of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE