-
2
-
-
21044449695
-
Persistent authenticated dictionaries and their applications
-
A. Anagnostopoulos, M. T. Goodrich, and R. Tamassia. Persistent authenticated dictionaries and their applications. In Information Security Conference (ISC 2001), LNCS 2200, 379-393, 2001.
-
(2001)
Information Security Conference (ISC 2001), LNCS
, vol.2200
, pp. 379-393
-
-
Anagnostopoulos, A.1
Goodrich, M.T.2
Tamassia, R.3
-
3
-
-
0036329754
-
Tracing network attacks to their sources
-
T. Baba and S. Matsuda. Tracing network attacks to their sources. IEEE Internet Computing, 6(2):20-26, 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.2
, pp. 20-26
-
-
Baba, T.1
Matsuda, S.2
-
4
-
-
0004075434
-
ICMP traceback messages
-
Internet Draft draft-bellovin-itrace-00.txt, March
-
S. M. Bellovin. ICMP traceback messages. In Work in Progress, Internet Draft draft-bellovin-itrace-00.txt, March 2000.
-
(2000)
Work in Progress
-
-
Bellovin, S.M.1
-
6
-
-
4243626563
-
Authenticated data structures for graph and geometric searching
-
Technical report, Brown University
-
R. Cohen, M. T. Goodrich, R. Tamassia, and N. Triandopoulos. Authenticated data structures for graph and geometric searching. Technical report, Brown University, 2001.
-
(2001)
-
-
Cohen, R.1
Goodrich, M.T.2
Tamassia, R.3
Triandopoulos, N.4
-
9
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
M. T. Goodrich, R. Tamassia, and A. Schwerin. Implementation of an authenticated dictionary with skip lists and commutative hashing. In 2001 DARPA Information Survivability Conference and Exposition, vol. 2, 68-82, 2001.
-
(2001)
2001 DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 68-82
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
11
-
-
0003657593
-
-
Addison-Wesley, Reading, MA, 2nd edition
-
D. E. Knuth. Fundamental Algorithms, vol. 1 of The Art of Computer Programming. Addison-Wesley, Reading, MA, 2nd edition, 1973.
-
(1973)
Fundamental Algorithms, Vol. 1 of the Art of Computer Programming
-
-
Knuth, D.E.1
-
12
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
16
-
-
0005513622
-
The effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
K. Park and H. Lee. The effectiveness of probabilistic packet marking for IP traceback under denial of service attack, 2000.
-
(2000)
-
-
Park, K.1
Lee, H.2
-
17
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
July
-
V. Paxson. An analysis of using reflectors for distributed denial-of-service attacks. ACM Computer Communications Review (CCR), 31(3), July 2001.
-
(2001)
ACM Computer Communications Review (CCR)
, vol.31
, Issue.3
-
-
Paxson, V.1
-
18
-
-
0038289990
-
-
Internet protocol
-
J. Postel. Internet protocol, 1981.
-
(1981)
-
-
Postel, J.1
-
19
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson. Practical network support for IP traceback. In SIGCOMM, 295-306, 2000.
-
(2000)
SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.4
-
20
-
-
0001887844
-
Hash-based IP traceback
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer. Hash-based IP traceback. In ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2001.
-
ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2001
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
21
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. In IEEE Infocomm, 2001.
-
(2001)
IEEE Infocomm
-
-
Song, D.1
Perrig, A.2
|