메뉴 건너뛰기




Volumn 3364 LNCS, Issue , 2005, Pages 80-96

Guaranteeing access in spite of distributed service-flooding attacks

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK-LINE RATE;

EID: 33645692419     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11542322_12     Document Type: Conference Paper
Times cited : (4)

References (28)
  • 2
    • 84949938425 scopus 로고    scopus 로고
    • DOS-resistant authentication with client puzzles
    • Proc. of the 8th Int'l Security Protocols Workshop, Cambridge, U.K., April 2000, Springer Verlag
    • T. Aura, P. Nikander, and J. Leiwo, "DOS-Resistant Authentication with Client Puzzles," Proc. of the 8th Int'l Security Protocols Workshop, Cambridge, U.K., April 2000, LNCS vol. 2133, Springer Verlag, pp. 170-178.
    • LNCS , vol.2133 , pp. 170-178
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 5
    • 0003217168 scopus 로고    scopus 로고
    • Hot spares for DoS attacks
    • July
    • T. Darmohray and R. Oliver, "Hot Spares for DoS Attacks," ;login:, Vol. 25, No. 7, July 2000.
    • (2000) Login , vol.25 , Issue.7
    • Darmohray, T.1    Oliver, R.2
  • 7
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • Proc. of Advances in Cryptography: CRYPTO '92, Springer Verlag
    • C. Dwork and M. Naor, "Pricing via Processing or Combatting Junk Mail," Proc. of Advances in Cryptography: CRYPTO '92, LNCS Vol. 740, Springer Verlag, 1992.
    • (1992) LNCS , vol.740
    • Dwork, C.1    Naor, M.2
  • 10
    • 0022614726 scopus 로고
    • On denial of service in computer networks
    • Los Angeles, California, February
    • V.D. Gligor, "On Denial of Service in Computer Networks," Proc. of Int'l Conference on Data Engineering, Los Angeles, California, February 1986, pp. 608-617.
    • (1986) Proc. of Int'l Conference on Data Engineering , pp. 608-617
    • Gligor, V.D.1
  • 11
    • 84958968987 scopus 로고    scopus 로고
    • Fast encryption and authentication: XCBC encryption and XECB authentication modes
    • FSE 2001, M. Matsui (ed.), Yokohama, Japan, April
    • V.D. Gligor and P. Donescu, "Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes," 8th International Workshop on Fast Sofware Encryption, FSE 2001, M. Matsui (ed.), Yokohama, Japan, April 2001, pp. 92-108.
    • (2001) 8th International Workshop on Fast Sofware Encryption , pp. 92-108
    • Gligor, V.D.1    Donescu, P.2
  • 12
    • 0025383763 scopus 로고
    • A guided tour of chernoff bounds
    • North-Holland
    • T. Hagerup and C. Rub, "A Guided Tour of Chernoff Bounds," Information Processing Letters, vol. 33, 1989-90, North-Holland, pp. 305-308.
    • (1989) Information Processing Letters , vol.33 , pp. 305-308
    • Hagerup, T.1    Rub, C.2
  • 13
    • 0014413249 scopus 로고
    • The tragedy of commons
    • G. Hardin, "The Tragedy of Commons," Science, vol 162, (1968): 1243.
    • (1968) Science , vol.162 , pp. 1243
    • Hardin, G.1
  • 16
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic defense against connection depletion attacks
    • San Diego, CA, Feb.
    • A. Juels and J. Brainard, "Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks," in Proc. of Network and Distributed Systems Symposium, San Diego, CA, Feb. 1999.
    • (1999) Proc. of Network and Distributed Systems Symposium
    • Juels, A.1    Brainard, J.2
  • 17
    • 33645696082 scopus 로고    scopus 로고
    • Software components: Only giants survive
    • A. Herbert and K. Sparck Jones (eds.), Microsoft Research, February
    • B. Lampson, "Software Components: Only Giants Survive," in Computer Systems: Papers for Roger Needham, A. Herbert and K. Sparck Jones (eds.), Microsoft Research, February 2003, pp. 113-120.
    • (2003) Computer Systems: Papers for Roger Needham , pp. 113-120
    • Lampson, B.1
  • 22
    • 1142270162 scopus 로고    scopus 로고
    • S. Pearson, B. Balacheff, L. Chen, D Palquin, G. Proudler (eds.), Prentice Hall PTR
    • Trusted Computing Platforms - TCPA Technology in Context, S. Pearson, B. Balacheff, L. Chen, D Palquin, G. Proudler (eds.), Prentice Hall PTR, 2003.
    • (2003) Trusted Computing Platforms - TCPA Technology in Context
  • 25
    • 84954449334 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions
    • Berkeley, CA, May
    • X. Wang and M. Reiter, "Defending Against Denial-of-Service Attacks with Puzzle Auctions," Proc. of IEEE Symp. on Security and Privacy, Berkeley, CA, May 2003.
    • (2003) Proc. of IEEE Symp. on Security and Privacy
    • Wang, X.1    Reiter, M.2
  • 26
    • 2342665173 scopus 로고    scopus 로고
    • Hello, are you human
    • Georgia Institute of Technology, November
    • J. Xu, R. Lipton, and I. Essa, "Hello, Are You Human," Technical Report, Georgia Institute of Technology, November 2000.
    • (2000) Technical Report
    • Xu, J.1    Lipton, R.2    Essa, I.3
  • 27
    • 0023829320 scopus 로고
    • A formal specification and verification method for preventing denial of service attacks
    • Oakland, CA., April
    • C.-F. Yu and V.D. Gligor, "A Formal Specification and Verification Method for Preventing Denial of Service Attacks," Proc. of the IEEE Security and Privacy Symposium, Oakland, CA., April 1988, pp. 187-2002
    • (1988) Proc. of the IEEE Security and Privacy Symposium , pp. 187-2002
    • Yu, C.-F.1    Gligor, V.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.