메뉴 건너뛰기




Volumn 47, Issue , 2017, Pages 301-310

Towards network denial of service resistant protocols

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET PROTOCOLS; NETWORK SECURITY;

EID: 1642344572     PISSN: 18684238     EISSN: 1868422X     Source Type: Book Series    
DOI: 10.1007/978-0-387-35515-3_31     Document Type: Conference Paper
Times cited : (17)

References (40)
  • 7
    • 0022093904 scopus 로고
    • Optimal attack and reinforcement of a network
    • W. H. Cunningham. Optimal attack and reinforcement of a network. J. ACM, 32(3):549-561, 1985.
    • (1985) J. ACM , vol.32 , Issue.3 , pp. 549-561
    • Cunningham, W.H.1
  • 11
    • 0026900438 scopus 로고
    • A logic for reasoning about security
    • J. Glasgow, G. MacEwen, and P. Panangaden. A logic for reasoning about security. ACM TOGS, 10(3):226-264, 1992.
    • (1992) ACM TOGS , vol.10 , Issue.3 , pp. 226-264
    • Glasgow, J.1    Macewen, G.2    Panangaden, P.3
  • 13
    • 0021426851 scopus 로고
    • A note on denial-of-service in operating systems
    • V. D. Gligor. A note on denial-of-service in operating systems. IEEE TOSE, 10(3):320-324, 1984.
    • (1984) IEEE TOSE , vol.10 , Issue.3 , pp. 320-324
    • Gligor, V.D.1
  • 14
    • 84958674474 scopus 로고    scopus 로고
    • Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack
    • Springer-Verlag
    • S. Hirose and K. Matsuura. Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack. In ICICS'99, LNCS 1726. Springer-Verlag, 1999.
    • (1999) ICICS'99, LNCS 1726
    • Hirose, S.1    Matsuura, K.2
  • 15
    • 85066117646 scopus 로고
    • version 1.2. COM(92) 298 final, Brussels, Sept
    • Information technology security evaluation criteria (ITSEC), version 1.2. COM(92) 298 final, Brussels, Sept., 1992.
    • (1992)
  • 22
    • 84957867935 scopus 로고    scopus 로고
    • A method to implement a denial of service protection base
    • Springer­ Verlag
    • J. Leiwo, C. Gamage, and Y. Zheng. A method to implement a denial of service protection base. In ACISP'97, LNCS 1270, Springer­ Verlag, 1997.
    • (1997) ACISP'97, LNCS 1270
    • Leiwo, J.1    Gamage, C.2    Zheng, Y.3
  • 26
    • 2342570485 scopus 로고
    • A resource allocation model for denial of service
    • J. K. Millen. A resource allocation model for denial of service. In IEEE S&P, 1992.
    • (1992) IEEE S&P
    • Millen, J.K.1
  • 30
    • 0028532812 scopus 로고
    • Denial of service: An example
    • R. M. Needham. Denial of service: An example. CACM, 37(11):42-46, 1994.
    • (1994) CACM , vol.37 , Issue.11 , pp. 42-46
    • Needham, R.M.1
  • 39
    • 0031176702 scopus 로고    scopus 로고
    • A simple min-cut algorithm
    • M. Stoer and F. Wagner. A simple min-cut algorithm. J.ACM, 44(4):585-591, 1997.
    • (1997) J.ACM , vol.44 , Issue.4 , pp. 585-591
    • Stoer, M.1    Wagner, F.2
  • 40
    • 0025441368 scopus 로고
    • A specification and verification method for preventing denial of service
    • C.-F. Yu and V. D. Gligor. A specification and verification method for preventing denial of service. IEEE TOSE, 16(6):581-592, 1990.
    • (1990) IEEE TOSE , vol.16 , Issue.6 , pp. 581-592
    • Yu, C.-F.1    Gligor, V.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.