-
2
-
-
85180777711
-
An algebraic approach to IP traceback
-
D. Dean, M. Franklin, A. Stubblefield, An algebraic approach to IP traceback, in: Proceedings of the Network and Distributed System Security Symposium (NDSS), 2001, p. 312
-
(2001)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
, pp. 312
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
3
-
-
0035361712
-
Network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson Network support for IP traceback ACM/IEEE Transactions on Networking 9 3 2001 226 237
-
(2001)
ACM/IEEE Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
4
-
-
33744945767
-
SOS: Secure overlay services
-
A.D. Keromytis, V. Misra, D. Rubenstein, SOS: secure overlay services, in: Proceedings of ACM SIGCOMM, 2002, pp. 61-72
-
(2002)
Proceedings of ACM SIGCOMM
, pp. 61-72
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
7
-
-
18844441915
-
Fileteller: Paying and getting paid for file storage
-
J. Ioannidis, S. Ioannidis, A.D. Keromytis, V. Prevelakis, Fileteller: paying and getting paid for file storage, in: Proceeding of Financial Cryptography (FC) Conference, 2002, pp. 282-299
-
(2002)
Proceeding of Financial Cryptography (FC) Conference
, pp. 282-299
-
-
Ioannidis, J.1
Ioannidis, S.2
Keromytis, A.D.3
Prevelakis, V.4
-
8
-
-
3342890415
-
A blueprint for introducing disruptive technology into the Internet
-
citeseer.nj.nec.com/peterson02blueprint.html
-
L. Peterson, D. Culler, T. Anderson, T. Roscoe, A blueprint for introducing disruptive technology into the Internet, in: Proceedings of the 1st Workshop on Hot Topics in Networks (HotNets-I), 2002. URL available from: < citeseer.nj.nec.com/peterson02blueprint.html >
-
(2002)
Proceedings of the 1st Workshop on Hot Topics in Networks (HotNets-I)
-
-
Peterson, L.1
Culler, D.2
Anderson, T.3
Roscoe, T.4
-
10
-
-
2642522187
-
A holistic approach to service survivability
-
A.D. Keromytis, J. Parekh, P.N. Gross, G. Kaiser, V. Misra, J. Nieh, D. Rubenstein, S. Stolfo, A holistic approach to service survivability, in: Proceedings of the ACM Survivable and Self-Regenerative Systems Workshop, 2003, pp. 11-22
-
(2003)
Proceedings of the ACM Survivable and Self-regenerative Systems Workshop
, pp. 11-22
-
-
Keromytis, A.D.1
Parekh, J.2
Gross, P.N.3
Kaiser, G.4
Misra, V.5
Nieh, J.6
Rubenstein, D.7
Stolfo, S.8
-
11
-
-
0003068282
-
Security architecture for the Internet protocol
-
IETF, November
-
S. Kent, R. Atkinson, Security architecture for the Internet protocol, RFC 2401, IETF, November 1998. URL available from: < ftp://ftp.isi.edu/in- notes/rfc2401.txt >
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
14
-
-
0034449536
-
Implementing a distributed firewall
-
S. Ioannidis, A. Keromytis, S. Bellovin, J. Smith, Implementing a distributed firewall, in: Proceedings of Computer and Communications Security (CCS), 2000, pp. 190-199
-
(2000)
Proceedings of Computer and Communications Security (CCS)
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.2
Bellovin, S.3
Smith, J.4
-
15
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for Internet application
-
I. Stoica, R. Morris, D. Karger, F. Kaashoek, H. Balakrishnan, Chord: a scalable peer-to-peer lookup service for Internet application, in: Proceedings of ACM SIGCOMM, 2001
-
(2001)
Proceedings of ACM SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, F.4
Balakrishnan, H.5
-
16
-
-
0030704545
-
Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web
-
citeseer.nj.nec.com/karger97consistent.html
-
D. Karger, E. Lehman, F. Leighton, R. Panigrahy, M. Levine, D. Lewin, Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web, in: Proceedings of ACM Symposium on Theory of Computing (STOC), 1997, pp. 654-663. URL available from: < citeseer.nj.nec.com/karger97consistent.html >
-
(1997)
Proceedings of ACM Symposium on Theory of Computing (STOC)
, pp. 654-663
-
-
Karger, D.1
Lehman, E.2
Leighton, F.3
Panigrahy, R.4
Levine, M.5
Lewin, D.6
-
17
-
-
12244282921
-
CAPTCHA: Using hard AI problems for security
-
L. von Ahn, M. Blum, N.J. Hopper, J. Langford, CAPTCHA: using hard AI problems for security, in: Proceedings of EUROCRYPT, 2003
-
(2003)
Proceedings of EUROCRYPT
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
19
-
-
35248846520
-
TAPI: Transactions for accessing public infrastructure
-
M. Blaze, J. Ioannidis, S. Ioannidis, A.D. Keromytis, P. Nikander, V. Prevelakis, TAPI: transactions for accessing public infrastructure, in: Proceedings of the 8th IFIP Personal Wireless Communications (PWC) Conference, 2003, pp. 90-10
-
(2003)
Proceedings of the 8th IFIP Personal Wireless Communications (PWC) Conference
, pp. 90-110
-
-
Blaze, M.1
Ioannidis, J.2
Ioannidis, S.3
Keromytis, A.D.4
Nikander, P.5
Prevelakis, V.6
-
20
-
-
0003226048
-
The KeyNote Trust Management System Version 2
-
September
-
M. Blaze, J. Feigenbaum, J. Ioannidis, A.D. Keromytis, The KeyNote Trust Management System Version 2, RFC 2704, September 1999
-
(1999)
RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
21
-
-
0003252383
-
Generic routing encapsulation (GRE)
-
IETF, March
-
D. Farinacci, T. Li, S. Hanks, D. Meyer, P. Traina, Generic routing encapsulation (GRE), RFC 2784, IETF, March 2000. URL available from: < http://www.rfc-editor.org/rfc/rfc2784.txt >
-
(2000)
RFC
, vol.2784
-
-
Farinacci, D.1
Li, T.2
Hanks, S.3
Meyer, D.4
Traina, P.5
-
22
-
-
0007690307
-
Key and sequence number extensions to GRE
-
IETF, September 2000
-
G. Dommety, Key and sequence number extensions to GRE, RFC 2890, IETF, September 2000. URL available from: < http://www.rfc-editor.org/rfc/rfc2890. txt >
-
RFC
, vol.2890
-
-
Dommety, G.1
-
23
-
-
18144366327
-
Observations from router-level Internet traces
-
L. Amini, H. Schulzrinne, A. Lazar, Observations from router-level Internet traces, in: DIMACSWorkshop on Internet and WWW Measurement, Mapping and Modeling, 2002
-
(2002)
DIMACSWorkshop on Internet and WWW Measurement, Mapping and Modeling
-
-
Amini, L.1
Schulzrinne, H.2
Lazar, A.3
-
24
-
-
85084161486
-
Inferring Internet denial-of-service activity
-
D. Moore, G. Voelker, S. Savage, Inferring Internet denial-of-service activity, in: Proceedings of the 10th USENIX Security Symposium, 2001, pp. 9-22
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 9-22
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
25
-
-
0003218499
-
PPP extensible authentication protocol (EAP)
-
IETF, March
-
J.V.L. Blunk, PPP extensible authentication protocol (EAP), RFC 2284, IETF, March 1998. URL available from: < http://www.ietf.org/rfc/rfc2284.txt >
-
(1998)
RFC
, vol.2284
-
-
Blunk, J.V.L.1
-
27
-
-
85084162787
-
Authorization and charging in public lawns using freebased and 802.1x
-
Freenix Track
-
P. Nikander, Authorization and charging in public lawns using freebased and 802.1x, in: Proceedings of the Annual USENIX Technical Conference, Freenix Track, 2002
-
(2002)
Proceedings of the Annual USENIX Technical Conference
-
-
Nikander, P.1
-
28
-
-
0012625191
-
-
IETF, February
-
N. Haller, C. Metz, P. Nesser, M. Straw, A one-time password system, RFC 2289, IETF, February 1998. URL available from: < http://www.ietf.org/rfc/ rfc2289.txt >
-
(1998)
A one-time Password System
, vol.2289
-
-
Haller, N.1
Metz, C.2
Nesser, P.3
Straw, M.4
-
29
-
-
18644386802
-
Analysis of routing algorithms for secure overlay service
-
Columbia University, April
-
D. Cook, Analysis of Routing Algorithms for Secure Overlay Service, Computer Science Department Technical Report CUCS-010-02, Columbia University, April 2002. URL available from: < http://www.cs.columbia.edu/~library/TR- repository/reports/reports-2002/cucs-010-02.pdf >
-
(2002)
Computer Science Department Technical Report
, vol.CUCS-010-02
-
-
Cook, D.1
-
30
-
-
0001983901
-
A scalable content-addressable network
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, A scalable content-addressable network, in: Proceedings of ACM SIGCOMM, 2001
-
(2001)
Proceedings of ACM SIGCOMM
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
31
-
-
45849108185
-
On the performance of TCP splicing for URLAware redirection
-
citeseer.nj.nec.com/cohen99performance.html
-
A. Cohen, S. Rangarajan, J.H. Slye, On the performance of TCP splicing for URLAware redirection, in: USENIX Symposium on Internet Technologies and Systems, 1999. URL available from: < citeseer.nj.nec.com/cohen99performance. html >
-
(1999)
USENIX Symposium on Internet Technologies and Systems
-
-
Cohen, A.1
Rangarajan, S.2
Slye, J.H.3
-
32
-
-
85084162744
-
A study of the relative costs of network security protocols
-
Freenix Track
-
S. Miltchev, S. Ioannidis, A.D. Keromytis, A study of the relative costs of network security protocols, in: Proceedings of USENIX Annual Technical Conference, Freenix Track), 2002, pp. 41-48
-
(2002)
Proceedings of USENIX Annual Technical Conference
, pp. 41-48
-
-
Miltchev, S.1
Ioannidis, S.2
Keromytis, A.D.3
-
33
-
-
1642302623
-
The design of the OpenBSD cryptographic framework
-
A.D. Keromytis, J.L. Wright, T. de Raadt, The design of the OpenBSD cryptographic framework, in: Proceedings of the USENIX Annual Technical Conference, 2003, pp. 181-196
-
(2003)
Proceedings of the USENIX Annual Technical Conference
, pp. 181-196
-
-
Keromytis, A.D.1
Wright, J.L.2
De Raadt, T.3
-
34
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
C. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram, D. Zamboni, Analysis of a denial of service attack on TCP, in: IEEE Security and Privacy Conference, 1997, pp. 208-223
-
(1997)
IEEE Security and Privacy Conference
, pp. 208-223
-
-
Schuba, C.1
Krsul, I.2
Kuhn, M.3
Spafford, E.4
Sundaram, A.5
Zamboni, D.6
-
36
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson TCP congestion control with a misbehaving receiver ACM Computer Communications Review 29 5 1999 71 78
-
(1999)
ACM Computer Communications Review
, vol.29
, Issue.5
, pp. 71-78
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
37
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proceedings of the 2000 ACM SIGCOMM Conference, 2000, pp. 295-306
-
(2000)
Proceedings of the 2000 ACM SIGCOMM Conference
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
39
-
-
0001887844
-
Hash-based IP traceback
-
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, W. Strayer, Hash-based IP traceback, in: Proceedings of ACM SIGCOMM, 2001
-
(2001)
Proceedings of ACM SIGCOMM
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Kent, S.6
Strayer, W.7
-
41
-
-
3543126644
-
Large-scale IP traceback in high-speed Internet: Practical techniques and theoretical foundation
-
J. Li, M. Sung, J. Xu, L. Li, large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation, in: Proceedings of the IEEE Symposium on Security and Privacy, 2004
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Li, J.1
Sung, M.2
Xu, J.3
Li, L.4
-
43
-
-
84942253601
-
COSSACK: Coordinated suppression of simultaneous attacks
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, R. Govindan, COSSACK: coordinated suppression of simultaneous attacks, in: Proceedings of DISCEX III, 2003, pp. 2-13
-
(2003)
Proceedings of DISCEX III
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
44
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed dos traffic
-
C. Jin, H. Wang, K.G. Shin, Hop-count filtering: an effective defense against spoofed dos traffic, in: Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS), 2003, pp. 30-41
-
(2003)
Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS)
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
45
-
-
1242287724
-
A framework for classifying denial of service attacks
-
A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, in: Proceedings of ACM SIGCOMM, 2003, pp. 99-110
-
(2003)
Proceedings of ACM SIGCOMM
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
48
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets
-
K. Park, H. Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets, in: Proceedings of ACM SIGCOMM, 2001, pp. 15-26
-
(2001)
Proceedings of ACM SIGCOMM
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
49
-
-
85034043506
-
-
World Wide Web citeseer.nj.nec.com/444367.html
-
F. Kargl, J. Maier, M. Weber, Protecting web servers from distributed denial of service attacks, in: World Wide Web, 2001, pp. 514-524. URL available from: < citeseer.nj.nec.com/444367.html >
-
(2001)
Protecting Web Servers from Distributed Denial of Service Attacks
, pp. 514-524
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
-
51
-
-
66249131125
-
WebSOS: Protecting web servers from DDoS attacks
-
D.L. Cook, W.G. Morein, A.D. Keromytis, V. Misra, D. Rubenstein, WebSOS: protecting web servers from DDoS attacks, in: Proceedings of the 11th IEEE International Conference on Networks (ICON), 2003, pp. 455-460
-
(2003)
Proceedings of the 11th IEEE International Conference on Networks (ICON)
, pp. 455-460
-
-
Cook, D.L.1
Morein, W.G.2
Keromytis, A.D.3
Misra, V.4
Rubenstein, D.5
-
52
-
-
18744376590
-
Using graphic turing tests to counter automated DDoS attacks against web servers
-
W.G. Morein, A. Stavrou, D.L. Cook, A.D. Keromytis, V. Misra, D. Rubenstein, Using graphic turing tests to counter automated DDoS attacks against web servers, in: Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS), 2003, pp. 8-19
-
(2003)
Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS)
, pp. 8-19
-
-
Morein, W.G.1
Stavrou, A.2
Cook, D.L.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
56
-
-
33751110528
-
Taming IP packet flooding attacks
-
K. Lakshminarayanan, D. Adkins, A. Perrig, I. Stoica, Taming IP packet flooding attacks, in: Proceedings of the Second Workshop on Hot Topics in Networks (HotNets-II), 2003
-
(2003)
Proceedings of the Second Workshop on Hot Topics in Networks (HotNets-II)
-
-
Lakshminarayanan, K.1
Adkins, D.2
Perrig, A.3
Stoica, I.4
-
57
-
-
34250620174
-
NetBouncer: Client-legitimacy-based high-performance DDoS filtering
-
R. Thomas, B. Mark, T. Johnson, J. Croall, NetBouncer: client-legitimacy-based high-performance DDoS filtering, in: Proceedings of DISCEX III, 2003, pp. 14-25
-
(2003)
Proceedings of DISCEX III
, pp. 14-25
-
-
Thomas, R.1
Mark, B.2
Johnson, T.3
Croall, J.4
-
59
-
-
58049101580
-
Analyzing interaction between distributed denial of service attacks and mitigation technologies
-
W.J. Blackert, D.M. Gregg, A.K. Castner, E.M. Kyle, R.L. Hom, R.M. Jokerst, Analyzing interaction between distributed denial of service attacks and mitigation technologies, in: Proceedings of DISCEX III, 2003, pp. 26-36
-
(2003)
Proceedings of DISCEX III
, pp. 26-36
-
-
Blackert, W.J.1
Gregg, D.M.2
Castner, A.K.3
Kyle, E.M.4
Hom, R.L.5
Jokerst, R.M.6
-
62
-
-
84949238095
-
Offline micropayments without trusted hardware
-
M. Blaze, J. Ioannidis, A.D. Keromytis, Offline micropayments without trusted hardware, in: Proceedings of the Fifth International Conference on Financial Cryptography, 2001, pp. 21-40
-
(2001)
Proceedings of the Fifth International Conference on Financial Cryptography
, pp. 21-40
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
-
63
-
-
0027005999
-
Achieving electronic privacy
-
D. Chaum Achieving electronic privacy Scientific American 1992 96 101
-
(1992)
Scientific American
, pp. 96-101
-
-
Chaum, D.1
-
66
-
-
1642324117
-
VarietyCash: A multi-purpose electronic payment system
-
USENIX
-
M. Bellare, J. Garay, C. Jutla, M. Yung, VarietyCash: a multi-purpose electronic payment system, in: Proceedings of the Third USENIX Workshop on Electronic Commerce, USENIX, 1998
-
(1998)
Proceedings of the Third USENIX Workshop on Electronic Commerce
-
-
Bellare, M.1
Garay, J.2
Jutla, C.3
Yung, M.4
-
71
-
-
0001797564
-
PayWord and MicroMint
-
R. Rivest, and A. Shamir PayWord and MicroMint CryptoBytes 2 1 1996 7 11
-
(1996)
CryptoBytes
, vol.2
, Issue.1
, pp. 7-11
-
-
Rivest, R.1
Shamir, A.2
-
73
-
-
35048889161
-
Safeguarding digital library contents
-
A. Herzberg, Safeguarding Digital Library Contents, D-Lib Magazine
-
D-Lib Magazine
-
-
Herzberg, A.1
-
74
-
-
85051038557
-
Requirements for network payment: The Netcheque prospective
-
C. Neuman, G. Medvinsky, Requirements for network payment: The Netcheque prospective, in: Proceedings of IEEE COMCON, 1995
-
(1995)
Proceedings of IEEE COMCON
-
-
Neuman, C.1
Medvinsky, G.2
-
75
-
-
84964476742
-
IKP-A family of secure electronic payment protocols
-
USENIX
-
M. Bellare, J. Garay, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, M. Waidner, iKP-A family of secure electronic payment protocols, in: Proceedings of the First USENIX Workshop on Electronic Commerce, USENIX, 1995
-
(1995)
Proceedings of the First USENIX Workshop on Electronic Commerce
-
-
Bellare, M.1
Garay, J.2
Herzberg, A.3
Krawczyk, H.4
Steiner, M.5
Tsudik, G.6
Waidner, M.7
-
76
-
-
84958042278
-
A payment scheme using vouchers
-
Proceedings of the Second International Conference on Financial Cryptography, Springer-Verlag
-
E. Foo, and C. Boyd A payment scheme using vouchers Proceedings of the Second International Conference on Financial Cryptography Lecture Notes in Computer Science vol. 1465 1998 Springer-Verlag 103 121
-
(1998)
Lecture Notes in Computer Science
, vol.1465
, pp. 103-121
-
-
Foo, E.1
Boyd, C.2
|