-
1
-
-
21044449695
-
Persistent authenticated dictionaries and their applications
-
Springer-Verlag
-
A. Anagnostopoulos, M. T. Goodrich, and R. Tamassia, "Persistent authenticated dictionaries and their applications," in Proc. Information Security Conf. (ISC 2001), 2001, vol. LNCS 2200, pp. 379-393, Springer-Verlag.
-
(2001)
Proc. Information Security Conf. (ISC 2001)
, vol.LNCS 2200
, pp. 379-393
-
-
Anagnostopoulos, A.1
Goodrich, M.T.2
Tamassia, R.3
-
2
-
-
0036329754
-
Tracing network attacks to their sources
-
T. Baba and S. Matsuda, "Tracing network attacks to their sources," IEEE Internet Computing, vol. 6, no. 2, pp. 20-26, 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.2
, pp. 20-26
-
-
Baba, T.1
Matsuda, S.2
-
3
-
-
0004194675
-
-
work in Progress, Internet Draft draft-bellovin-itrace-00.txt, Mar
-
S. M. Bellovin, "ICMP traceback messages," work in Progress, Internet Draft draft-bellovin-itrace-00.txt, Mar. 2000.
-
(2000)
ICMP traceback messages
-
-
Bellovin, S.M.1
-
5
-
-
85180777711
-
An algebraic approach to IP traceback
-
D. Dean, M. Franklin, and A. Stubblefield, "An algebraic approach to IP traceback," in Proc. Network and Distributed System Security Symp. (NDSS), 2001, pp. 3-12.
-
(2001)
Proc. Network and Distributed System Security Symp. (NDSS)
, pp. 3-12
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
7
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
M. T. Goodrich, R. Tamassia, and A. Schwerin, "Implementation of an authenticated dictionary with skip lists and commutative hashing," in Proc. 2001 DARPA Information Survivability Conf. Expo., 2001, vol. 2, pp. 68-82.
-
(2001)
Proc. 2001 DARPA Information Survivability Conf. Expo
, vol.2
, pp. 68-82
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
9
-
-
25844469597
-
You can run, but you can't hide: An effective statistical methodology to trace back DDOS attackers
-
Sep
-
T. K. T. Law, D. K. Y. Yau, and J. C. S. Lui, "You can run, but you can't hide: An effective statistical methodology to trace back DDOS attackers," IEEE Trans. Parallel Distrib. Syst., vol. 16, no. 9, pp. 799-813, Sep. 2005.
-
(2005)
IEEE Trans. Parallel Distrib. Syst
, vol.16
, Issue.9
, pp. 799-813
-
-
Law, T.K.T.1
Yau, D.K.Y.2
Lui, J.C.S.3
-
11
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson, "Practical network support for IP traceback," in Proc. ACM SIGCOMM, 2000, pp. 295-306.
-
(2000)
Proc. ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.4
-
12
-
-
0001887844
-
Hash-based IP traceback
-
San Diego, CA
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer, "Hash-based IP traceback," in Proc. ACM SIGCOMM 2001 Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication, San Diego, CA, 2001.
-
(2001)
Proc. ACM SIGCOMM 2001 Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
13
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," in Proc. IEEE INFOCOM, 2001, pp. 878-886.
-
(2001)
Proc. IEEE INFOCOM
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
14
-
-
85084163540
-
Centertrack: An IP overlay network for tracking DoS floods
-
Denver, CO, Aug
-
R. Stone, "Centertrack: An IP overlay network for tracking DoS floods," in Proc. 9th USENIX Security Symp., Denver, CO, Aug. 2000.
-
(2000)
Proc. 9th USENIX Security Symp
-
-
Stone, R.1
|