Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2015_2_a6, author = {N. I. Anisenya}, title = {Developing safe protocol for distributed task-based {CTF} holding system}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {59--70}, publisher = {mathdoc}, number = {2}, year = {2015}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2015_2_a6/} }
N. I. Anisenya. Developing safe protocol for distributed task-based CTF holding system. Prikladnaâ diskretnaâ matematika, no. 2 (2015), pp. 59-70. http://geodesic.mathdoc.fr/item/PDM_2015_2_a6/
[1] Kolegov D. N., Chernushenko Yu. N., “About the CTF – computer security competitions”, Prikladnaya Diskretnaya Matematika, 2008, no. 2, 81–83 (in Russian)
[2] CTFtime.org – All about CTF (Capture The Flag), , 2014 https://ctftime.org/ctf-wtf/
[3] DEF CON Hacking Conference, , 2014 https://www.defcon.org/
[4] PHDays – Positive Hack Days, , 2014 http://www.phdays.ru/
[5] RuCTF, , 2014 http://ructf.org/
[6] Anisenya N. I., Stefantsov D. A., Torgaeva T. A., “The BlackBox service for hosting Capture The Flag computer security competitions”, Prikladnaya Diskretnaya Matematika. Prilozhenie, 2013, no. 6, 52–56 (in Russian)
[7] Blackbox, , 2014 http://blackbox.sibears.ru/
[8] SiBCTF, , 2014 http://sibctf.ru/
[9] Clarke I., Sandberg O., Wiley B., Hong T. W., “Freenet: a distributed anonymous information storage and retrieval system”, Designing Privacy Enhancing Technologies, Intern. Workshop on Design Issues in Anonymity and Unobservability, Springer Verlag, N.Y., 2001, 46–66 | Zbl
[10] Tor Project, , 2014 https://www.torproject.org/
[11] Haber S., Stornetta W. S., “How to time-stamp a digital document”, J. Cryptology, 3:2 (1991), 99–111
[12] Bitcoin – Open source P2P money, , 2014 http://bitcoin.org/
[13] Dwork C., Naor M., “Pricing via processing or combatting Junk Mail”, Proc. CRYPTO'92, Springer, Berlin–Heidelberg, 1993, 139–147 | Zbl