-
5
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
Dec.
-
H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," Proc. Usenix LISA 2000, Dec. 2000.
-
(2000)
Proc. Usenix LISA 2000
-
-
Burch, H.1
Cheswick, B.2
-
6
-
-
0033885344
-
Performance of hashing-based schemes for Internet load balancing
-
Mar.
-
Z. Cao, Z. Wang, and E. Zegura, "Performance of Hashing-Based Schemes for Internet Load Balancing," Proc. Infocom 2000, Mar. 2000.
-
(2000)
Proc. Infocom 2000
-
-
Cao, Z.1
Wang, Z.2
Zegura, E.3
-
10
-
-
85180777711
-
An algebraic approach to IP traceback
-
Feb.
-
D. Dean, M. Franklin, and A. Stubblefield, "An Algebraic Approach to IP Traceback," Proc. Network and Distributed System Security Symp. (NDSS 2001), pp. 3-12, Feb. 2001.
-
(2001)
Proc. Network and Distributed System Security Symp. (NDSS 2001)
, pp. 3-12
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
11
-
-
0034448864
-
Using router stamping to identify the source of IP packets
-
Nov.
-
T. Doeppner, P. Klein, and A. Koyfman, "Using Router Stamping to Identify the Source of IP Packets," Proc. ACM Conf. Computer and Comm. Security (CCS-7), pp. 184-189, Nov. 2000.
-
(2000)
Proc. ACM Conf. Computer and Comm. Security (CCS-7)
, pp. 184-189
-
-
Doeppner, T.1
Klein, P.2
Koyfman, A.3
-
13
-
-
0002000920
-
Denial-of-service attacks rip the Internet
-
Apr.
-
L. Garber, "Denial-of-Service Attacks Rip the Internet," Computer, vol. 33, no. 4, pp. 12-17, Apr. 2000.
-
(2000)
Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
14
-
-
85084163167
-
Multops: A data-structure for bandwidth attack detection
-
Aug.
-
T. Gil and M. Poletto, "Multops: A Data-Structure for Bandwidth Attack Detection," Proc. 10th Usenix Security Symp., Aug. 2001.
-
(2001)
Proc. 10th Usenix Security Symp.
-
-
Gil, T.1
Poletto, M.2
-
15
-
-
0031244719
-
Modeling the performance of http over several transport protocols
-
Oct.
-
J. Heidemann, K. Obraczka, and J. Touch, "Modeling the Performance of http over Several Transport Protocols," IEEE/ACM Trans. Networking, vol. 5, no. 5, pp. 616-630, Oct. 1997.
-
(1997)
IEEE/ACM Trans. Networking
, vol.5
, Issue.5
, pp. 616-630
-
-
Heidemann, J.1
Obraczka, K.2
Touch, J.3
-
22
-
-
85034043506
-
Protecting web servers from distributed denial of service attacks
-
May
-
F. Kargl, J. Maier, S. Schlott, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," WWW-10, May 2001.
-
(2001)
WWW-10
-
-
Kargl, F.1
Maier, J.2
Schlott, S.3
Weber, M.4
-
24
-
-
0031373091
-
An empirical model of http network traffic
-
Apr.
-
B. Mah, "An Empirical Model of http Network Traffic," Proc. Infocom '97, Apr. 1997.
-
(1997)
Proc. Infocom '97
-
-
Mah, B.1
-
25
-
-
0003552333
-
-
technical report, ACIRI and AT&T Labs Research, Feb.
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," technical report, ACIRI and AT&T Labs Research, Feb. 2001.
-
(2001)
Controlling High Bandwidth Aggregates in the Network
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
27
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sept.
-
C. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm. Magazine, Sept. 1994, W. Stallings, Practical Cryptography for Data Internetworks, IEEE CS Press, 1996.
-
(1994)
IEEE Comm. Magazine
-
-
Neuman, C.1
Ts'o, T.2
-
29
-
-
0001843064
-
Improving http latency
-
Dec.
-
V. Padmanabhan, J. Mogul, "Improving http Latency," Computer Networks and ISDN Systems, vol. 28, nos. 1-2, Dec. 1995.
-
(1995)
Computer Networks and ISDN Systems
, vol.28
, Issue.1-2
-
-
Padmanabhan, V.1
Mogul, J.2
-
30
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
Apr.
-
K. Park and H. Lee, "On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack," Proc. IEEE Infocom 2001, Apr. 2000.
-
(2000)
Proc. IEEE Infocom 2001
-
-
Park, K.1
Lee, H.2
-
31
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed DOS attack prevention in power-law Internets
-
Aug.
-
K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DOS Attack Prevention in Power-Law Internets," Proc. ACM Sigcomm 2001, Aug. 2001.
-
(2001)
Proc. ACM Sigcomm 2001
-
-
Park, K.1
Lee, H.2
-
32
-
-
0032097258
-
A 50-gb/s IP router
-
June
-
C. Partridge et al., "A 50-gb/s IP Router," IEEE/ACM Trans. Networking, vol. 6, no. 3, pp. 237-248, June 1998.
-
(1998)
IEEE/ACM Trans. Networking
, vol.6
, Issue.3
, pp. 237-248
-
-
Partridge, C.1
-
34
-
-
0029701328
-
The omega key management service
-
M.K. Reiter, M.K. Franklin, J.B. Lacy, and R.N. Wright, "The Omega Key Management Service," Proc. ACM Conf. Computer and Comm. Security, pp. 38-47, 1996.
-
(1996)
Proc. ACM Conf. Computer and Comm. Security
, pp. 38-47
-
-
Reiter, M.K.1
Franklin, M.K.2
Lacy, J.B.3
Wright, R.N.4
-
36
-
-
0033650584
-
Practical network support for IP traceback
-
Aug.
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," Proc. ACM SIGCOMM 2000, pp. 295-306, Aug. 2000.
-
(2000)
Proc. ACM SIGCOMM 2000
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
38
-
-
85013295511
-
Efficient fair queuing using deficit round robin
-
Aug.
-
M. Shreedhar and G. Varghese, "Efficient Fair Queuing Using Deficit Round Robin," Proc. ACM SIGCOMM '95, pp. 231-242, Aug. 1995.
-
(1995)
Proc. ACM SIGCOMM '95
, pp. 231-242
-
-
Shreedhar, M.1
Varghese, G.2
-
40
-
-
0034997397
-
Advanced and authenticated marking schemes for IF traceback
-
Apr.
-
D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IF Traceback," Proc. Infocom 2001, Apr. 2001.
-
(2001)
Proc. Infocom 2001
-
-
Song, D.1
Perrig, A.2
-
43
-
-
0031650779
-
Design considerations for supporting TCP with per-flow queueing
-
Mar.
-
B. Suter, T. Lakshman, D. Stiliadis, and A. Choudhury, "Design Considerations for Supporting TCP with Per-Flow Queueing," Proc. IEEE INFOCOM '98, Mar. 1998.
-
(1998)
Proc. IEEE INFOCOM '98
-
-
Suter, B.1
Lakshman, T.2
Stiliadis, D.3
Choudhury, A.4
-
45
-
-
84894342690
-
RSVP: A new resource ReSerVation protocol
-
Sept.
-
L. Zhang, S. Deering, and D. Estrin, "RSVP: A New Resource ReSerVation Protocol," IEEE Network, vol. 7, no. 5, pp. 8-18, Sept. 1993.
-
(1993)
IEEE Network
, vol.7
, Issue.5
, pp. 8-18
-
-
Zhang, L.1
Deering, S.2
Estrin, D.3
-
46
-
-
0003515999
-
-
technical report, Dept. of Computer Science, Cornell Univ., Dec.
-
L. Zhou, F. Schneider, and R. Renesse, "Coca: A Secure Distributed On-Line Certification Authority," technical report, Dept. of Computer Science, Cornell Univ., Dec. 2000.
-
(2000)
Coca: A Secure Distributed On-Line Certification Authority
-
-
Zhou, L.1
Schneider, F.2
Renesse, R.3
|