-
1
-
-
85093840697
-
-
UMAC implementation
-
UMAC implementation. http://www.cs.ucdavis.edu/∼rogaway/umac/.
-
-
-
-
2
-
-
85093843218
-
-
Caida report. February
-
Caida report. http://www.caida.org/analysis/AIX/plenhist/, February 2000.
-
(2000)
-
-
-
3
-
-
25844486083
-
Spoofing prevention method
-
B.-B. A. and L. H
-
B.-B. A. and L. H. Spoofing prevention method. In Proc. IEEE Infocom, 2005.
-
(2005)
Proc. IEEE Infocom
-
-
-
4
-
-
85050149881
-
Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks
-
K. Argyraki and D. Cheriton. Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. In USENIX 2005, 2005.
-
(2005)
USENIX 2005
-
-
Argyraki, K.1
Cheriton, D.2
-
5
-
-
85093834625
-
DDoS attacks still pose threat to Internet
-
11/4/03
-
DDoS attacks still pose threat to Internet. BizReport, 11/4/03.
-
BizReport
-
-
-
6
-
-
0037623983
-
Identity based encryption from the weil pairing
-
D. Boneh and M. Franklin. Identity based encryption from the weil pairing. SIAM J. of Computing, 32(3):586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
85032963495
-
Design and implementation of a routing control platform
-
M. Caesar, D. Caldwell, N. Feamster, J. Rexford, and A. S. andJacobus van der Merwe. Design and implementation of a routing control platform. In Proc. of NSDI, 2005.
-
(2005)
Proc. of NSDI
-
-
Caesar, M.1
Caldwell, D.2
Feamster, N.3
Rexford, J.4
andJacobus van der Merwe, A. S.5
-
8
-
-
85093855677
-
Extortion via DDoS on the rise
-
5/16/05
-
Extortion via DDoS on the rise. Network World, 5/16/05.
-
Network World
-
-
-
10
-
-
0010057139
-
Analysis of the autonomous system network topology
-
July
-
D.Magoni and J.J.Pansiot. Analysis of the autonomous system network topology. Computer Communications Review, 31(3):26-37, July 2001.
-
(2001)
Computer Communications Review
, vol.31
, Issue.3
, pp. 26-37
-
-
Magoni, D.1
Pansiot, J.J.2
-
11
-
-
0024665231
-
Visa protocols for controlling inter-organization datagram flow
-
May
-
D. Estrin, J. C. Mogul, G. Tsudik., and K.Anand. Visa protocols for controlling inter-organization datagram flow. IEEE Journal on Selected Areas in Communication, 7(4):486-498, May 1989.
-
(1989)
IEEE Journal on Selected Areas in Communication
, vol.7
, Issue.4
, pp. 486-498
-
-
Estrin, D.1
Mogul, J. C.2
Tsudik, G.3
Anand, K.4
-
12
-
-
0003462010
-
-
Technical Report 1361, Department of Computer Science, University of Wisconsin-Madison
-
L. Fan, P. Cao, J. Almeida, and A. Z. Broder. Summary cache: A scalable wide-area web cache sharing protocol. Technical Report 1361, Department of Computer Science, University of Wisconsin-Madison, 1998.
-
(1998)
Summary cache: A scalable wide-area web cache sharing protocol
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A. Z.4
-
13
-
-
0003334329
-
Network Ingress Filtering: Defeating Denial of Service Attacks that Employ IP Source Address Spoofing
-
P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks that Employ IP Source Address Spoofing. Internet RFC 2827, 2000.
-
(2000)
Internet RFC
, vol.2827
-
-
Ferguson, P.1
Senie, D.2
-
19
-
-
34748827677
-
UMAC: Message authentication code using universal hashing
-
T. Krovetz. UMAC: Message authentication code using universal hashing. Internet RFC 4418, 2006.
-
(2006)
Internet RFC
, vol.4418
-
-
Krovetz, T.1
-
21
-
-
0036349004
-
SAVE: Source address validity enforcement
-
J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang. SAVE: Source address validity enforcement. In Proc. of INFOCOM, 2002.
-
(2002)
Proc. of INFOCOM
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
22
-
-
85093824527
-
Three practical ways to improve your network
-
K. Miller. Three practical ways to improve your network. In Proc. of USENIX LISA, 2003.
-
(2003)
Proc. of USENIX LISA
-
-
Miller, K.1
-
24
-
-
0001083965
-
On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets
-
K. Park and H. Lee. On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In ACM SIGCOMM, 2001.
-
(2001)
ACM SIGCOMM
-
-
Park, K.1
Lee, H.2
-
25
-
-
0030661010
-
Ticket based service access for the mobile user
-
B. Patel and J. Crowcroft. Ticket based service access for the mobile user. In Proceedings of MobiCom'97, pages 223-233, 1997.
-
(1997)
Proceedings of MobiCom'97
, pp. 223-233
-
-
Patel, B.1
Crowcroft, J.2
-
27
-
-
0001887844
-
Hash-Based IP Traceback
-
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. Strayer. Hash-Based IP Traceback. In ACM SIGCOMM, 2001.
-
(2001)
ACM SIGCOMM
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Kent, S.6
Strayer, W.7
-
28
-
-
0034997397
-
Advance and Authenticated Marking Schemes for IP Traceback
-
D. Song and A. Perrig. Advance and Authenticated Marking Schemes for IP Traceback. In Proc. IEEE Infocom, 2001.
-
(2001)
Proc. IEEE Infocom
-
-
Song, D.1
Perrig, A.2
-
32
-
-
33749866400
-
A DoS-Limiting Network Architecture
-
Philadelphia, PA, Aug
-
X. Yang, D. Wetherall, and T. Anderson. A DoS-Limiting Network Architecture. In ACM SIGCOMM, Philadelphia, PA, Aug. 2005.
-
(2005)
ACM SIGCOMM
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
|