-
2
-
-
85045893940
-
Moderately hard, memory-bound functions
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In Proc. NDSS '03, pages 25-39, 2003.
-
(2003)
Proc. NDSS '03
, pp. 25-39
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
3
-
-
3142632089
-
Just Fast Keying: Key agreement in a hostile Internet
-
W. Aiello, S. Bellovin, M. Blaze, R. Canetti, J. Ioannidis, A. Keromytis, and O. Reingold. Just Fast Keying: key agreement in a hostile Internet. ACM Trans. Information and Systems Security, 7(2):242-273, 2004.
-
(2004)
ACM Trans. Information and Systems Security
, vol.7
, Issue.2
, pp. 242-273
-
-
Aiello, W.1
Bellovin, S.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.6
Reingold, O.7
-
4
-
-
0042908709
-
Alternating-time temporal logic
-
R. Alur, T. Henzinger, and O. Kupferman. Alternating-time temporal logic. J. ACM, 49(5):672-713, 2002.
-
(2002)
J. ACM
, vol.49
, Issue.5
, pp. 672-713
-
-
Alur, R.1
Henzinger, T.2
Kupferman, O.3
-
5
-
-
0001178022
-
MOCHA: Modularity in model checking
-
R. Alur, T. Henzinger, F. Mang, S. Qadeer, S. Rajamani, and S. Tasiran. MOCHA: modularity in model checking. In Proc. CAV '98, pages 512-525, 1998.
-
(1998)
Proc. CAV '98
, pp. 512-525
-
-
Alur, R.1
Henzinger, T.2
Mang, F.3
Qadeer, S.4
Rajamani, S.5
Tasiran, S.6
-
8
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom. Space/time trade-offs in hash coding with allowable errors. CACM, 13(7):422-426, 1970.
-
(1970)
CACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
9
-
-
4944247375
-
Formal analysis of multi-party contract signing
-
R. Chadha, S. Kremer, and A. Scedrov. Formal analysis of multi-party contract signing. In Proc. CSFW '04, pages 266-219, 2004.
-
(2004)
Proc. CSFW '04
, pp. 266-1219
-
-
Chadha, R.1
Kremer, S.2
Scedrov, A.3
-
14
-
-
3543119176
-
Guaranteeing access in spite of service-flooding attacks
-
V. Gligor. Guaranteeing access in spite of service-flooding attacks. In Proc. Security Protocols Workshop, 2003.
-
(2003)
Proc. Security Protocols Workshop
-
-
Gligor, V.1
-
15
-
-
0347470584
-
Fail-stop protocols: An approach to designing secure protocols
-
L. Gong and P. Syverson. Fail-stop protocols: an approach to designing secure protocols. In Proc. DCCA '95, pages 44-55, 1995.
-
(1995)
Proc. DCCA '95
, pp. 44-55
-
-
Gong, L.1
Syverson, P.2
-
17
-
-
84906087402
-
Abstract interpretation of game properties
-
T. Henzinger, R. Majumdar, F. Mang, and J.-F. Raskin. Abstract interpretation of game properties. In Proc. SAS '00, pages 220-239, 2000.
-
(2000)
Proc. SAS '00
, pp. 220-239
-
-
Henzinger, T.1
Majumdar, R.2
Mang, F.3
Raskin, J.-F.4
-
19
-
-
0011134472
-
Pushback: Router-based defense against DDos attacks
-
J. Ioannidis and S. Bellovin. Pushback: router-based defense against DDos attacks. In Proc. NDSS '02, pages 79-86, 2002.
-
(2002)
Proc. NDSS '02
, pp. 79-86
-
-
Ioannidis, J.1
Bellovin, S.2
-
20
-
-
0002459783
-
Client puzzles: A cryptographic defense against connection depletion
-
A. Juels and J. Brainard. Client puzzles: a cryptographic defense against connection depletion. In Proc. NDSS '99, pages 151-165, 1999.
-
(1999)
Proc. NDSS '99
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
21
-
-
84924375780
-
Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proc. NSDI, 2005.
-
(2005)
Proc. NSDI
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
23
-
-
84948779843
-
Game analysis of abuse-free contract signing
-
S. Kremer and J.-F. Raskin. Game analysis of abuse-free contract signing. In Proc. CSFW '02, pages 206-220, 2002.
-
(2002)
Proc. CSFW '02
, pp. 206-220
-
-
Kremer, S.1
Raskin, J.-F.2
-
24
-
-
0037937457
-
A game-based verification of non-repudiation and fair exchange protocols
-
S. Kremer and J.-F. Raskin. A game-based verification of non-repudiation and fair exchange protocols. J. Computer Security, 11(3):399-430, 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.3
, pp. 399-430
-
-
Kremer, S.1
Raskin, J.-F.2
-
25
-
-
28144445427
-
Using admissible interference to detect denial of service vulnerabilities
-
S. Lafrance and J. Mullins. Using admissible interference to detect denial of service vulnerabilities. In Proc. IWFM '03, 2003.
-
(2003)
Proc. IWFM '03
-
-
Lafrance, S.1
Mullins, J.2
-
26
-
-
0006013621
-
Towards network denial of service resistant protocols
-
J. Leiwo, T. Auro, and P. Nikander. Towards network denial of service resistant protocols. In Proc. SEC '00, pages 301-310, 2000.
-
(2000)
Proc. SEC '00
, pp. 301-310
-
-
Leiwo, J.1
Auro, T.2
Nikander, P.3
-
27
-
-
14344258545
-
Incentive-based modeling and inference of attacker intent
-
P. Liu and W. Zang. Incentive-based modeling and inference of attacker intent. In Proc. CCS '03, pages 179-189, 2003.
-
(2003)
Proc. CCS '03
, pp. 179-189
-
-
Liu, P.1
Zang, W.2
-
28
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. ACM CCR, 32(3):62-73, 2002.
-
(2002)
ACM CCR
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
29
-
-
0035075103
-
A cost-based framework for analysis of denial of service in networks
-
C. Meadows. A cost-based framework for analysis of denial of service in networks. J. Computer Security, 9(1/2): 143-164, 2001.
-
(2001)
J. Computer Security
, vol.9
, Issue.1-2
, pp. 143-164
-
-
Meadows, C.1
-
33
-
-
18744376590
-
Using graphic Turing tests to counter automated DDoS attacks against web servers
-
W. Morein, A. Stavrou, C. Cook, A. Keromytis, V. Misra, and R. Rubenstein. Using graphic Turing tests to counter automated DDoS attacks against web servers. In Proc. CCS '03, pages 8-19, 2003.
-
(2003)
Proc. CCS '03
, pp. 8-19
-
-
Morein, W.1
Stavrou, A.2
Cook, C.3
Keromytis, A.4
Misra, V.5
Rubenstein, R.6
-
34
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In Proc. SIGCOMM '01, pages 15-26, 2001.
-
(2001)
Proc. SIGCOMM '01
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
35
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
V. Paxson. An analysis of using reflectors for distributed denial-of-service attacks. ACM CCR, 31(3):38-47, 2001.
-
(2001)
ACM CCR
, vol.31
, Issue.3
, pp. 38-47
-
-
Paxson, V.1
-
36
-
-
28144453915
-
Analyzing DoS-resistance of protocols using a cost-based framework
-
July
-
V. Ramachandran. Analyzing DoS-resistance of protocols using a cost-based framework. Yale Technical Report YALEU/DCS/TR-1239, July 2002.
-
(2002)
Yale Technical Report
, vol.YALEU-DCS-TR-1239
-
-
Ramachandran, V.1
-
37
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In Proc. SIGCOMM '00, pages 295-306, 2000.
-
(2000)
Proc. SIGCOMM '00
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
38
-
-
0034775309
-
Hash-based IP traceback
-
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. Strayer. Hash-based IP traceback. In Proc. SIGCOMM '01, pages 3-14, 2001.
-
(2001)
Proc. SIGCOMM '01
, pp. 3-14
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Kent, S.6
Strayer, W.7
-
39
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. In Proc. INFOCOM '01, pages 878-886, 2001.
-
(2001)
Proc. INFOCOM '01
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
41
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In Proc. EUROCRYPT '03, pages 294-311, 2003.
-
(2003)
Proc. EUROCRYPT '03
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
43
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auctions
-
X. Wang and M. Reiter. Defending against denial-of-service attacks with puzzle auctions. In Proc. IEEE Security and Privacy '03, pages 78-92, 2003.
-
(2003)
Proc. IEEE Security and Privacy '03
, pp. 78-92
-
-
Wang, X.1
Reiter, M.2
-
44
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
B. Waters, A. Juels, J. Halderman, and E. Felten. New client puzzle outsourcing techniques for DoS resistance. In Proc. CCS '04, pages 246-256, 2004.
-
(2004)
Proc. CCS '04
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.3
Felten, E.4
-
45
-
-
0037328484
-
Sustaining availability of Web services under distributed denial of service attacks
-
J. Xu and W. Lee. Sustaining availability of Web services under distributed denial of service attacks. IEEE Trans. Computers, 52(2): 195-208, 2003.
-
(2003)
IEEE Trans. Computers
, vol.52
, Issue.2
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
-
46
-
-
0037810705
-
Pi: A path identification mechanism to defend against DDos attacks
-
A. Yaar, A. Perrig, and D. Song. Pi: A path identification mechanism to defend against DDos attacks. In Proc. IEEE Security and Privacy '03, pages 93-109, 2003.
-
(2003)
Proc. IEEE Security and Privacy '03
, pp. 93-109
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
47
-
-
3543097593
-
SIFF: A stateless Internet flow filter to mitigate DDos flooding attacks
-
A. Yaar, D. Song, and A. Perrig. SIFF: A stateless Internet flow filter to mitigate DDos flooding attacks. In Proc. IEEE Security and Privacy '04, pages 130-146, 2004.
-
(2004)
Proc. IEEE Security and Privacy '04
, pp. 130-146
-
-
Yaar, A.1
Song, D.2
Perrig, A.3
|