-
1
-
-
34547427800
-
-
P. Inc. Treo smartphones. [Online]. Available: http://www.palm.com/us/
-
P. Inc. Treo smartphones. [Online]. Available: http://www.palm.com/us/
-
-
-
-
2
-
-
34547432452
-
-
S. Ltd. Symbian smartphones for the enterprise. [Online]. Available: http://www.symbian.com/symbianos/index.html
-
S. Ltd. Symbian smartphones for the enterprise. [Online]. Available: http://www.symbian.com/symbianos/index.html
-
-
-
-
3
-
-
34547422719
-
-
M. Corp. Windows mobile-based smartphones. [Online]. Available: http://www.microsoft.com/windowsmobile/smartphone
-
M. Corp. Windows mobile-based smartphones. [Online]. Available: http://www.microsoft.com/windowsmobile/smartphone
-
-
-
-
5
-
-
0035075103
-
A cost-based framework for analysis of denial of service in networks
-
C. Meadows, "A cost-based framework for analysis of denial of service in networks," Journal of Computer Security, vol. 9, no. 1, pp. 143-164, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1
, pp. 143-164
-
-
Meadows, C.1
-
6
-
-
25644445353
-
The design and implementation of network puzzles
-
W. Feng, E. Kaiser, W. Feng, and A. Luu, "The design and implementation of network puzzles," in Proc. INFOCOM'05, 2005.
-
(2005)
Proc. INFOCOM'05
-
-
Feng, W.1
Kaiser, E.2
Feng, W.3
Luu, A.4
-
7
-
-
3543119176
-
Guaranteeing access in spite of service-flooding attacks
-
V. Gligor, "Guaranteeing access in spite of service-flooding attacks," in Proc. Security Protocols Workshop, 2003.
-
(2003)
Proc. Security Protocols Workshop
-
-
Gligor, V.1
-
8
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auctions
-
X. Wang and M. Reiter, "Defending against denial-of-service attacks with puzzle auctions," in Proc. IEEE Security and Privacy, 2003, pp. 78-92.
-
(2003)
Proc. IEEE Security and Privacy
, pp. 78-92
-
-
Wang, X.1
Reiter, M.2
-
9
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
B. Waters, A. Juels, J. Halderman, and E. Felten, "New client puzzle outsourcing techniques for DoS resistance," in Proc. Computer and Communications Security, 2004, pp. 246-256.
-
(2004)
Proc. Computer and Communications Security
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.3
Felten, E.4
-
10
-
-
0037517134
-
DoS-resistant authentication with client puzzles
-
T. Aura, P. Nikander, and J. Leiwo, "DoS-resistant authentication with client puzzles," in 8th International Workshop on Security Protocols. Springer-Verlag, 2000, pp. 170-181.
-
(2000)
8th International Workshop on Security Protocols. Springer-Verlag
, pp. 170-181
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
12
-
-
0002459783
-
Client puzzles: A cryptographic defense against connection depletion
-
San Diego
-
A. Juels and J. Brainard, "Client puzzles: A cryptographic defense against connection depletion," in Network and Distributed System Security, San Diego, 1999, pp. 151-165.
-
(1999)
Network and Distributed System Security
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
|