-
2
-
-
0038006575
-
Internet Indirection Infrastructure
-
August
-
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana, "Internet Indirection Infrastructure," in ACM SIGCOMM, August 2002.
-
(2002)
ACM SIGCOMM
-
-
Stoica, I.1
Adkins, D.2
Zhuang, S.3
Shenker, S.4
Surana, S.5
-
3
-
-
33751110528
-
Taming IP Packet Flooding Attacks
-
November
-
K. Lakshminarayanan, D. Adkins, A. Perrig, and I. Stoica, "Taming IP Packet Flooding Attacks," in HotNets, November 2003.
-
(2003)
HotNets
-
-
Lakshminarayanan, K.1
Adkins, D.2
Perrig, A.3
Stoica, I.4
-
5
-
-
4544272175
-
Controlling High Bandwidth Aggregates in the Network
-
July
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," ACM SIGCOMM CCR, vol. 32, no. 3, July 2002.
-
(2002)
ACM SIGCOMM CCR
, vol.32
, Issue.3
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
7
-
-
0038404196
-
Defending Against Distributed Denial-of-service Attacks with Max-min Fair Server-centric Router Throttles
-
May
-
D. Yau, J. Lui, and F. Liang, "Defending Against Distributed Denial-of-service Attacks with Max-min Fair Server-centric Router Throttles," in Proceedings of IWQoS, May 2002.
-
(2002)
Proceedings of IWQoS
-
-
Yau, D.1
Lui, J.2
Liang, F.3
-
8
-
-
3543121457
-
Preventing Internet Denial-of-Service with Capabilities
-
November
-
T. Anderson, T. Roscoe, and D. Wetherall, "Preventing Internet Denial-of-Service with Capabilities," in HotNets, November 2003.
-
(2003)
HotNets
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
10
-
-
0001126172
-
Pricing via Processing or Combatting Junk Mail
-
August
-
C. Dwork and M. Naor, "Pricing via Processing or Combatting Junk Mail," in CRYPTO, August 1992.
-
(1992)
CRYPTO
-
-
Dwork, C.1
Naor, M.2
-
11
-
-
0002459783
-
Client Puzzles: A Cryptographic Defense Against Connection Depletion
-
February
-
A. Juels and J. Brainard, "Client Puzzles: A Cryptographic Defense Against Connection Depletion," in NDSS, February 1999.
-
(1999)
NDSS
-
-
Juels, A.1
Brainard, J.2
-
13
-
-
14844310899
-
Hashcash: A Denial of Service Counter-Measure
-
Tech. Rep, Cypherspace, August
-
A. Back, "Hashcash: A Denial of Service Counter-Measure," Tech. Rep., Cypherspace, August 2002, http://www.hashcash.org/papers/hashcash.pdf.
-
(2002)
-
-
Back, A.1
-
16
-
-
3142619105
-
-
February, Internet Draft draft-ietf-hip-base-07. txt
-
R. Moskowitz, P. Nikander, P. Jokela, and T. Henderson, "Host identity protocol," February 2007, Internet Draft draft-ietf-hip-base-07. txt.
-
(2007)
Host identity protocol
-
-
Moskowitz, R.1
Nikander, P.2
Jokela, P.3
Henderson, T.4
-
17
-
-
36049043721
-
The Case for Pushing DNS
-
November
-
M. Handley and A. Greenhalgh, "The Case for Pushing DNS," in HotNets, November 2005.
-
(2005)
HotNets
-
-
Handley, M.1
Greenhalgh, A.2
-
18
-
-
33646047928
-
The Design and Implementation of a Next Generation Name Service for the Internet
-
August
-
V. Ramasubramanian and E. Sirer, "The Design and Implementation of a Next Generation Name Service for the Internet," in ACM SIGCOMM, August 2004.
-
(2004)
ACM SIGCOMM
-
-
Ramasubramanian, V.1
Sirer, E.2
-
19
-
-
36348977485
-
Complexity and Completeness of Finding Another Solution and Its Application to Puzzles,
-
Tech. Rep, University of Tokyo Master Thesis, January
-
T. Yato, "Complexity and Completeness of Finding Another Solution and Its Application to Puzzles," Tech. Rep., University of Tokyo Master Thesis, January 2003.
-
(2003)
-
-
Yato, T.1
-
20
-
-
43249096003
-
Hash Function Balance and its Impact on Birthday Attacks
-
May
-
M. Bellare and T. Kohno, "Hash Function Balance and its Impact on Birthday Attacks," in EUROCRYPT, May 2004.
-
(2004)
EUROCRYPT
-
-
Bellare, M.1
Kohno, T.2
-
21
-
-
33845584959
-
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
-
September
-
L. Fan, P. Cao, J. Almeida, and A. Broder, "Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol," in ACM SIGCOMM, September 1998.
-
(1998)
ACM SIGCOMM
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.4
-
22
-
-
33744479345
-
Freenet: A Distributed Anonymous Information Storage and Retrieval System
-
I. Clarke, O. Sandberg, B. Wiley, and T. Hong, "Freenet: A Distributed Anonymous Information Storage and Retrieval System," Lecture Notes in Computer Science, vol. 2009, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2009
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.4
-
23
-
-
0002245383
-
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
-
August
-
I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan, "Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications," in ACM SIGCOMM, August 2001.
-
(2001)
ACM SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.4
Balakrishnan, H.5
-
24
-
-
0003242071
-
A Scalable Content-Addressable Network
-
August
-
S. Ratnasamy, M. Handley, R. Karp, and S. Shenker, "A Scalable Content-Addressable Network," in ACM SIGCOMM, August 2001.
-
(2001)
ACM SIGCOMM
-
-
Ratnasamy, S.1
Handley, M.2
Karp, R.3
Shenker, S.4
-
30
-
-
4544360452
-
New Directions in Traffic Measurement and Accounting
-
August
-
C. Estan and G. Varghese, "New Directions in Traffic Measurement and Accounting," in ACM SIGCOMM, August 2002.
-
(2002)
ACM SIGCOMM
-
-
Estan, C.1
Varghese, G.2
-
32
-
-
8344224137
-
Low-rate TCP-targeted Denial of Service Attacks (the Shrew vs. the Mice and Elephants)
-
August
-
A. Kuzmanovic and E. Knightly, "Low-rate TCP-targeted Denial of Service Attacks (the Shrew vs. the Mice and Elephants)," in ACM SIGCOMM, August 2003.
-
(2003)
ACM SIGCOMM
-
-
Kuzmanovic, A.1
Knightly, E.2
-
34
-
-
79961236654
-
The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet
-
July
-
R. Beverly and S. Bauer, "The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet," in SRUTI, July 2005.
-
(2005)
SRUTI
-
-
Beverly, R.1
Bauer, S.2
-
35
-
-
0003375670
-
An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
-
July
-
V. Paxson, "An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks," ACM SIGCOMM CCR, vol. 31, no. 3, July 2001.
-
(2001)
ACM SIGCOMM CCR
, vol.31
, Issue.3
-
-
Paxson, V.1
-
37
-
-
70349748341
-
Strange Attractors and TCP/IP Sequence Number Analysis,
-
Tech. Rep, Bindview, April 2001
-
M. Zalewski, "Strange Attractors and TCP/IP Sequence Number Analysis," Tech. Rep., Bindview, April 2001, http://razor.bindview.com/ publish/papers/tcpseq.html.
-
-
-
Zalewski, M.1
-
38
-
-
33144457195
-
-
March
-
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, "DNS Security Introduction and Requirements," March 2005.
-
(2005)
DNS Security Introduction and Requirements
-
-
Arends, R.1
Austein, R.2
Larson, M.3
Massey, D.4
Rose, S.5
|