메뉴 건너뛰기




Volumn 54, Issue 9, 2003, Pages 810-823

A public-key based authentication and key establishment protocol coupled with a client puzzle

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; INTERNET; NETWORK PROTOCOLS; QUALITY OF SERVICE; RESOURCE ALLOCATION; SECURITY OF DATA; USER INTERFACES;

EID: 0038479936     PISSN: 15322882     EISSN: None     Source Type: Journal    
DOI: 10.1002/asi.10253     Document Type: Article
Times cited : (7)

References (24)
  • 2
    • 84949938425 scopus 로고    scopus 로고
    • DOS-resistant authentication with client puzzles
    • In Bruce Christianson, Bruno Crispo, and Mike Roe, (Eds.); Cambridge, UK, Lecture Notes in Computer Science series, 2133, Berlin, Springer-Verlag
    • Aura, T., Nikander, P., & Leiwo, J. (2000). DOS-resistant authentication with client puzzles. In Bruce Christianson, Bruno Crispo, and Mike Roe, (Eds.). Proceedings of the 8th International Workshop on Security Protocols (pp. 170-177), Cambridge, UK, Lecture Notes in Computer Science series, 2133, Berlin, Springer-Verlag.
    • (2000) Proceedings of the 8th International Workshop on Security Protocols , pp. 170-177
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 4
    • 0038531200 scopus 로고    scopus 로고
    • Denial of Service Attacks; Tech Tips, CERT Coordination Center, June 4, 2001
    • Denial of Service Attacks. (2001). Tech Tips, CERT Coordination Center, June 4, 2001. Available: http://www.cert.org/tech_tips/denial_of_service.html
    • (2001)
  • 6
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • Santa Barbara, California, USA, Lecture Notes in Computer Science, 740, Berling, Springer-Verlag
    • Dwork, C., & Naor, M. (1992). Pricing via processing or combatting junk mail. In Proceedings of 12th Annual International Cryptology Conference (CRYPTO'92) (pp. 139-147), Santa Barbara, California, USA, Lecture Notes in Computer Science, 740, Berling, Springer-Verlag.
    • (1992) Proceedings of 12th Annual International Cryptology Conference (CRYPTO'92) , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 7
    • 0003845170 scopus 로고    scopus 로고
    • Secure electronic commerce - Building the infrastructure for digital signatures and encryption
    • Upper Saddle River, NJ, Prentice Hall, Inc.
    • Ford, W., & Baum, M.S. (1997). Secure electronic commerce - building the infrastructure for digital signatures and encryption. Upper Saddle River, NJ, Prentice Hall, Inc.
    • (1997)
    • Ford, W.1    Baum, M.S.2
  • 9
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the internet
    • Garber, L. (2000). Denial-of-service attacks rip the internet. IEEE Computer, 33(4), 12-17.
    • (2000) IEEE Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 11
    • 84958674474 scopus 로고    scopus 로고
    • Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack
    • Sydney, Australia, Lecture Notes in Computer Science, 1726, Berlin, Springer-Verlag
    • Hirose, S., & Matsuura, K. (1999a). Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack. In Proceedings of the 2nd International Conference on Information and Communication Security (ICICS'99) (pp.169-182), Sydney, Australia, Lecture Notes in Computer Science, 1726, Berlin, Springer-Verlag.
    • (1999) Proceedings of the 2nd International Conference on Information and Communication Security (ICICS'99) , pp. 169-182
    • Hirose, S.1    Matsuura, K.2
  • 14
    • 0004077031 scopus 로고    scopus 로고
    • Photuris: Session-key management protocol
    • RFC2522, IETF Network Working Group
    • Karn, P., & Simpson, W. (1999). Photuris: session-key management protocol. RFC2522, IETF Network Working Group.
    • (1999)
    • Karn, P.1    Simpson, W.2
  • 17
    • 0034186982 scopus 로고    scopus 로고
    • Modified aggressive modes of internet key exchange resistant against denial-of-service attacks
    • Matsuura, K., & Imai, H. (2000). Modified aggressive modes of internet key exchange resistant against denial-of-service attacks. IEICE Transactions on Information and Systems, E83-D(5), 972-979.
    • (2000) IEICE Transactions on Information and Systems , vol.E83-D , Issue.5 , pp. 972-979
    • Matsuura, K.1    Imai, H.2
  • 18
    • 0003418425 scopus 로고    scopus 로고
    • Internet security association and key management protocol (ISAKMP)
    • RFC2408, IETF Network Working Group
    • Maughan, D., Schertler, M., Schneider, M., & Turner, J. (1998). Internet Security Association and Key Management Protocol (ISAKMP). RFC2408, IETF Network Working Group.
    • (1998)
    • Maughan, D.1    Schertler, M.2    Schneider, M.3    Turner, J.4
  • 22
    • 0032658583 scopus 로고    scopus 로고
    • Simple authenticated key agreement algorithm
    • Seo, D.H., & Sweeney, P. (1999). Simple authenticated key agreement algorithm. IEE Electronics Letters, 35(13), 1073-1074.
    • (1999) IEE Electronics Letters , vol.35 , Issue.13 , pp. 1073-1074
    • Seo, D.H.1    Sweeney, P.2
  • 24
    • 0037517166 scopus 로고    scopus 로고
    • TCP SYN Flooding and IP Spoofing Attacks; CERT Advisory CA-1996-21, CERT Coordination Center, September 19, 1996
    • TCP SYN Flooding and IP Spoofing Attacks. (1996). CERT Advisory CA-1996-21, CERT Coordination Center, September 19, 1996. Available: http://www.cert.org/advisories/CA-1996-21.html.
    • (1996)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.