메뉴 건너뛰기




Volumn , Issue , 2007, Pages 289-300

Portcullis: Protecting connection setup from denial-of-capability attacks

Author keywords

Network capability; Per computation fairness

Indexed keywords

NETWORK CAPABILITY; PERCOMPUTATION FAIRNESS;

EID: 36949036429     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1282380.1282413     Document Type: Conference Paper
Times cited : (118)

References (32)
  • 7
    • 84858487728 scopus 로고    scopus 로고
    • CAIDA
    • CAIDA. Skitter, http: //www.caida.org/tools/measurement/skitter/.
    • Skitter
  • 8
    • 84858485853 scopus 로고    scopus 로고
    • Clayton, Accessed May, 2007
    • Richard Clayton, http://www.cl.cam.ac.uk/~rncl/ Accessed May, 2007.
    • Richard1
  • 12
    • 0001126172 scopus 로고
    • Pricing via processing or combatting junk mail
    • C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Proceedings of CRYPTO, 1993.
    • (1993) Proceedings of CRYPTO
    • Dwork, C.1    Naor, M.2
  • 15
    • 51349165211 scopus 로고    scopus 로고
    • Cambridge, England. Available at, November
    • Helion Technology Limited. Fast SHA-1 hash core for ASIC. Cambridge, England. Available at http://www.heliontech.com/downloads/ shal_asic_fast_helioncore.pdf. November 2005.
    • (2005) Helion Technology Limited. Fast SHA-1 hash core for ASIC
  • 17
    • 0002459783 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of ISOC NDSS, 1999.
    • (1999) Proceedings of ISOC NDSS
    • Juels, A.1    Brainard, J.2
  • 19
    • 36949021939 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST) Computer Systems Laboratory. Secure hash standard. 180-1, April 1995.
    • National Institute of Standards and Technology (NIST) Computer Systems Laboratory. Secure hash standard. 180-1, April 1995.
  • 24
    • 36949017412 scopus 로고    scopus 로고
    • ConfiDNS: Leveraging scale and history to improve DNS security
    • November
    • Lindsey Poole and Vivek S. Pai. ConfiDNS: Leveraging scale and history to improve DNS security. In Proceedings of USENIX WORLDS, November 2006.
    • (2006) Proceedings of USENIX WORLDS
    • Poole, L.1    Pai, V.S.2
  • 25
    • 36949037232 scopus 로고    scopus 로고
    • FANFARE for the common flow
    • Technical Report CMU-CS-05-148, Carnegie Mellon, February
    • Elaine Shi, Bryan Parno, Adrian Perrig, Yih-Chun Hu, and Bruce Maggs. FANFARE for the common flow. Technical Report CMU-CS-05-148, Carnegie Mellon, February 2005.
    • (2005)
    • Shi, E.1    Parno, B.2    Perrig, A.3    Hu, Y.4    Maggs, B.5
  • 28
    • 14844334596 scopus 로고    scopus 로고
    • Mitigating bandwidth-exhaustion attacks using congestion puzzles
    • October
    • X. Wang and M. Reiter. Mitigating bandwidth-exhaustion attacks using congestion puzzles. In ACM CCS, October 2004.
    • (2004) ACM CCS
    • Wang, X.1    Reiter, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.