-
3
-
-
85045893940
-
Moderately hard, memory-bound functions
-
M. Abadi, M. Burrow, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, 2003.
-
(2003)
Proceedings of the 10th Annual Network and Distributed System Security Symposium
-
-
Abadi, M.1
Burrow, M.2
Manasse, M.3
Wobber, T.4
-
8
-
-
8344278876
-
The ICMP traceback messages
-
Draft-ietf-itrace-01.txt, December
-
S. Bellovin, M. Leech, and T. Taylor. The ICMP traceback messages. In Internet-Draft, draft-ietf-itrace-01.txt, December 1999. ftp://ftp.ietf.org/ internet-drafts/draft-ietf-itrace-01.txt.
-
(1999)
Internet-Draft
-
-
Bellovin, S.1
Leech, M.2
Taylor, T.3
-
9
-
-
0003794137
-
-
Prentice-Hall, Englewood-Cliffs, New Jersey, USA
-
D. Bertsekas and R. Gallager. Data Networks, Prentice-Hall, Englewood-Cliffs, New Jersey, USA, 1992.
-
(1992)
Data Networks
-
-
Bertsekas, D.1
Gallager, R.2
-
10
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of ACM, 13(7):422-426, 1970.
-
(1970)
Communications of ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
12
-
-
14844335598
-
-
Caida. Skitter. 2003. http://www.caida.org/tools/measurement/skitter.
-
(2003)
-
-
-
18
-
-
0032594135
-
Promoting the use of end-to-end congestion control in the internet
-
August
-
S. Floyd and K. Fall. Promoting the use of end-to-end congestion control in the internet. IEEE/ACM Transactions on Networking, August 1999.
-
(1999)
IEEE/ACM Transactions on Networking
-
-
Floyd, S.1
Fall, K.2
-
19
-
-
0034229418
-
Defeating distributed denial of service attacks
-
July - August
-
X. Geng and A. Whinston. Defeating distributed denial of service attacks. IEEE IT Professional, 2(4):36-41, July - August 2000.
-
(2000)
IEEE IT Professional
, vol.2
, Issue.4
, pp. 36-41
-
-
Geng, X.1
Whinston, A.2
-
20
-
-
3543119176
-
Guaranteeing access in spite of service-flooding attack
-
R. Hirschfeld, editor, Lecture Notes in Computer Science. Springer-Verlag
-
V. Gligor. Guaranteeing access in spite of service-flooding attack. In R. Hirschfeld, editor, Proceedings of the Security Protocols Workshop, Lecture Notes in Computer Science. Springer-Verlag, 2004.
-
(2004)
Proceedings of the Security Protocols Workshop
-
-
Gligor, V.1
-
22
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed traffic
-
C. Jin, H. Wang, and K. Shin. Hop-count filtering: An effective defense against spoofed traffic. In Proceedings of ACM CCS, 2003.
-
(2003)
Proceedings of ACM CCS
-
-
Jin, C.1
Wang, H.2
Shin, K.3
-
23
-
-
84861587712
-
Client puzzle: A cryptographic defense against connection depletion attacks
-
A. Juels and J. Brainard. Client puzzle: A cryptographic defense against connection depletion attacks. In S.Kent, editor, Proceedings of NDSS'99, pages 151-165, 1999.
-
(1999)
S.Kent, Editor, Proceedings of NDSS'99
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
25
-
-
4544272175
-
-
CCR, July
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. CCR, 32(3):62-73, July 2002.
-
(2002)
Controlling High Bandwidth Aggregates in the Network
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
26
-
-
0035703761
-
Controlling high-bandwidth flows at the congested router
-
November
-
R. Mahajan, S. Floyd, and D. Wetherall. Controlling high-bandwidth flows at the congested router. In Proceedings of ICNP, November 2001.
-
(2001)
Proceedings of ICNP
-
-
Mahajan, R.1
Floyd, S.2
Wetherall, D.3
-
27
-
-
18744376590
-
Using graphic turing tests to counter automated ddos attacks against web servers
-
W. Morein, A. Stavrou, D. Cook, A. Keromytis, V. Misra, and D. Rubenstein. Using graphic turing tests to counter automated ddos attacks against web servers. In Proceedings of ACM CCS, 2003.
-
(2003)
Proceedings of ACM CCS
-
-
Morein, W.1
Stavrou, A.2
Cook, D.3
Keromytis, A.4
Misra, V.5
Rubenstein, D.6
-
30
-
-
84964474589
-
Hardware support for a hash-based ip traceback
-
L. Sanchez, W. Milliken, A. Snoeren, F. Tchakountio, C. Jones, S. Kent, C. Partridge, and W. Strayer. Hardware support for a hash-based ip traceback. In Proceedings of the DARPA Information Survivability Conference and Exposition II, 2001. DISCEX'01.
-
Proceedings of the DARPA Information Survivability Conference and Exposition II, 2001. DISCEX'01
-
-
Sanchez, L.1
Milliken, W.2
Snoeren, A.3
Tchakountio, F.4
Jones, C.5
Kent, S.6
Partridge, C.7
Strayer, W.8
-
33
-
-
0001887844
-
Hash-based ip traceback
-
August
-
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. Strayer. Hash-based ip traceback. In Proceedings of the ACM SIGCOMM, August 2001.
-
(2001)
Proceedings of the ACM SIGCOMM
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Kent, S.6
Strayer, W.7
-
34
-
-
0034997397
-
Advanced and authenticated marking schemes for ip traceback
-
April
-
D. Song and A. Perrig. Advanced and authenticated marking schemes for ip traceback. In Proceedings of IEEE INFOCOMM, April 2001.
-
(2001)
Proceedings of IEEE INFOCOMM
-
-
Song, D.1
Perrig, A.2
-
35
-
-
0002709112
-
Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks
-
I. Stoca, S. Shenker, and H. Zhang. Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks. In Proceedings of ACM SIGCOMM, 1998.
-
(1998)
Proceedings of ACM SIGCOMM
-
-
Stoca, I.1
Shenker, S.2
Zhang, H.3
-
38
-
-
84954449334
-
Defending against denial-of-service attacks with puzzle auctions
-
May
-
X. Wang and M. Reiter. Defending against denial-of-service attacks with puzzle auctions. In IEEE Symposium on Security and Privacy, May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Wang, X.1
Reiter, M.2
-
39
-
-
84954422497
-
Pi: A path identification mechanism to defend against DDoS attacks
-
May
-
A. Yaar, A. Perrig, and D. Song. Pi: A path identification mechanism to defend against DDoS attacks. In IEEE Symposium on Security and Privacy, May 2003. http://www.ece.cmu.edu/~adrian/projects/pi.ps.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
|