-
1
-
-
0005966913
-
Stateless connections
-
Beijing, China, Lecture Notes in Computer Science, 1334, Berlin, Springer-Verlag, CA
-
Aura, T., & Nikander, P. (1997). Stateless connections. In Proceedings of International Conference on Information and Communications Security (ICICS'97) (pp. 87-97), Beijing, China, Lecture Notes in Computer Science, 1334, Berlin, Springer-Verlag, CA
-
(1997)
Proceedings of International Conference on Information and Communications Security (ICICS'97)
, pp. 87-97
-
-
Aura, T.1
Nikander, P.2
-
2
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
In Bruce Christianson, Bruno Crispo, and Mike Roe, (Eds.); Cambridge, UK, Lecture Notes in Computer Science series, 2133, Berlin, Springer-Verlag
-
Aura, T., Nikander, P., & Leiwo, J. (2000). DOS-resistant authentication with client puzzles. In Bruce Christianson, Bruno Crispo, and Mike Roe, (Eds.). Proceedings of the 8th International Workshop on Security Protocols (pp. 170-177), Cambridge, UK, Lecture Notes in Computer Science series, 2133, Berlin, Springer-Verlag.
-
(2000)
Proceedings of the 8th International Workshop on Security Protocols
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
3
-
-
0030672045
-
Logic for verifying public-key cryptographic protocols
-
Coffey, T., & Saidha, P. (1997). Logic for verifying public-key cryptographic protocols. IEE Proceedings in Computers and Digital Techniques, 144(1), 28-32.
-
(1997)
IEE Proceedings in Computers and Digital Techniques
, vol.144
, Issue.1
, pp. 28-32
-
-
Coffey, T.1
Saidha, P.2
-
4
-
-
0038531200
-
-
Denial of Service Attacks; Tech Tips, CERT Coordination Center, June 4, 2001
-
Denial of Service Attacks. (2001). Tech Tips, CERT Coordination Center, June 4, 2001. Available: http://www.cert.org/tech_tips/denial_of_service.html
-
(2001)
-
-
-
5
-
-
84958953847
-
Cryptanalysis of MD4
-
Cambridge, UK, Lecture Notes in Computer Science, 1039, Berlin, Springer-Verlag
-
Dobbertin, H. (1996). Cryptanalysis of MD4. In Proceedings of Third International Workshop on Fast Software Encryption (pp. 53-69), Cambridge, UK, Lecture Notes in Computer Science, 1039, Berlin, Springer-Verlag.
-
Proceedings of Third International Workshop on Fast Software Encryption
, pp. 53-69
-
-
Dobbertin, H.1
-
6
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
Santa Barbara, California, USA, Lecture Notes in Computer Science, 740, Berling, Springer-Verlag
-
Dwork, C., & Naor, M. (1992). Pricing via processing or combatting junk mail. In Proceedings of 12th Annual International Cryptology Conference (CRYPTO'92) (pp. 139-147), Santa Barbara, California, USA, Lecture Notes in Computer Science, 740, Berling, Springer-Verlag.
-
(1992)
Proceedings of 12th Annual International Cryptology Conference (CRYPTO'92)
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
7
-
-
0003845170
-
Secure electronic commerce - Building the infrastructure for digital signatures and encryption
-
Upper Saddle River, NJ, Prentice Hall, Inc.
-
Ford, W., & Baum, M.S. (1997). Secure electronic commerce - building the infrastructure for digital signatures and encryption. Upper Saddle River, NJ, Prentice Hall, Inc.
-
(1997)
-
-
Ford, W.1
Baum, M.S.2
-
9
-
-
0002000920
-
Denial-of-service attacks rip the internet
-
Garber, L. (2000). Denial-of-service attacks rip the internet. IEEE Computer, 33(4), 12-17.
-
(2000)
IEEE Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
11
-
-
84958674474
-
Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack
-
Sydney, Australia, Lecture Notes in Computer Science, 1726, Berlin, Springer-Verlag
-
Hirose, S., & Matsuura, K. (1999a). Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack. In Proceedings of the 2nd International Conference on Information and Communication Security (ICICS'99) (pp.169-182), Sydney, Australia, Lecture Notes in Computer Science, 1726, Berlin, Springer-Verlag.
-
(1999)
Proceedings of the 2nd International Conference on Information and Communication Security (ICICS'99)
, pp. 169-182
-
-
Hirose, S.1
Matsuura, K.2
-
14
-
-
0004077031
-
Photuris: Session-key management protocol
-
RFC2522, IETF Network Working Group
-
Karn, P., & Simpson, W. (1999). Photuris: session-key management protocol. RFC2522, IETF Network Working Group.
-
(1999)
-
-
Karn, P.1
Simpson, W.2
-
15
-
-
0006013621
-
Towards network denial of service resistant protocols
-
Leiwo, J., Nikander, P. & Aura, T. (2000). Towards network denial of service resistant protocols. In Proceedings of the 15th International Information Security Conference (IFIP/SEC 2000), Beijing, China.
-
(2000)
Proceedings of the 15th International Information Security Conference (IFIP/SEC 2000), Beijing, China
-
-
Leiwo, J.1
Nikander, P.2
Aura, T.3
-
17
-
-
0034186982
-
Modified aggressive modes of internet key exchange resistant against denial-of-service attacks
-
Matsuura, K., & Imai, H. (2000). Modified aggressive modes of internet key exchange resistant against denial-of-service attacks. IEICE Transactions on Information and Systems, E83-D(5), 972-979.
-
(2000)
IEICE Transactions on Information and Systems
, vol.E83-D
, Issue.5
, pp. 972-979
-
-
Matsuura, K.1
Imai, H.2
-
18
-
-
0003418425
-
Internet security association and key management protocol (ISAKMP)
-
RFC2408, IETF Network Working Group
-
Maughan, D., Schertler, M., Schneider, M., & Turner, J. (1998). Internet Security Association and Key Management Protocol (ISAKMP). RFC2408, IETF Network Working Group.
-
(1998)
-
-
Maughan, D.1
Schertler, M.2
Schneider, M.3
Turner, J.4
-
19
-
-
84944878354
-
-
Boca Raton, FL, CRC Press
-
Menezes, A.J., van Oorschot, P. C., & Vanstone, S.A. (1997). Handbook of Applied Cryptography. Boca Raton, FL, CRC Press.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
20
-
-
0037517170
-
-
Osborne: McGraw-Hill
-
Nash, A., Duane, W., Joseph, C. & Brink, D. (2001). PKI: implementing and managing E-security. Osborne: McGraw-Hill.
-
(2001)
PKI: Implementing and Managing E-Security
-
-
Nash, A.1
Duane, W.2
Joseph, C.3
Brink, D.4
-
22
-
-
0032658583
-
Simple authenticated key agreement algorithm
-
Seo, D.H., & Sweeney, P. (1999). Simple authenticated key agreement algorithm. IEE Electronics Letters, 35(13), 1073-1074.
-
(1999)
IEE Electronics Letters
, vol.35
, Issue.13
, pp. 1073-1074
-
-
Seo, D.H.1
Sweeney, P.2
-
24
-
-
0037517166
-
-
TCP SYN Flooding and IP Spoofing Attacks; CERT Advisory CA-1996-21, CERT Coordination Center, September 19, 1996
-
TCP SYN Flooding and IP Spoofing Attacks. (1996). CERT Advisory CA-1996-21, CERT Coordination Center, September 19, 1996. Available: http://www.cert.org/advisories/CA-1996-21.html.
-
(1996)
-
-
|