Defending hash tables from algorithmic complexity attacks with resource burning

We consider the problem of defending a hash table against a Byzantine attacker that is trying to degrade the performance of query, insertion and deletion operations. Our defense makes use of resource burning (RB)—the verifiable expenditure of network resources—where the issuer of a request incurs so...

Full description

Saved in:
Bibliographic Details
Published in:Theoretical computer science Vol. 1014; p. 114762
Main Authors: Chakraborty, Trisha, Saia, Jared, Young, Maxwell
Format: Journal Article
Language:English
Published: Elsevier B.V 27.10.2024
Subjects:
ISSN:0304-3975
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first