-
1
-
-
38149106111
-
Formal modelling and analysis of DoS using probabilistic rewrite theories
-
Chicago;
-
Agha G, Greenwald M, Gunter CA, Khanna S, Meseguer J, Sen K, et al. Formal modelling and analysis of DoS using probabilistic rewrite theories. Proceedings of the IEEE workshop on foundations of computer security (FCS'05). Chicago; 2005.
-
(2005)
Proceedings of the IEEE workshop on foundations of computer security (FCS'05)
-
-
Agha, G.1
Greenwald, M.2
Gunter, C.A.3
Khanna, S.4
Meseguer, J.5
Sen, K.6
et al7
-
2
-
-
0038687767
-
DoS-resistant, secure key exchange for internet protocols
-
ACM Press p. 48-58
-
Aiello W., Bellovin S.M., Blaze M., Ioannidis J., Reingold O., Canetti R., et al. DoS-resistant, secure key exchange for internet protocols. Proceedings of the 9th ACM conference on computer and communications security (2002), ACM Press p. 48-58
-
(2002)
Proceedings of the 9th ACM conference on computer and communications security
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Ioannidis, J.4
Reingold, O.5
Canetti, R.6
-
4
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
Springer Verlag p. 170-81
-
Aura T., Nikander P., and Leiwo J. DOS-resistant authentication with client puzzles. Proceedings of the security protocols workshop, Cambridge, UK. LNCS 2133 (2001), Springer Verlag p. 170-81
-
(2001)
Proceedings of the security protocols workshop, Cambridge, UK. LNCS 2133
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
5
-
-
38349029320
-
Intrusion attack tactics for the model checking of e-commerce security guarantees
-
Springer Verlag p. 238-51
-
Basagiannis S., Katsaros P., and Pombortsis A. Intrusion attack tactics for the model checking of e-commerce security guarantees. Proceedings of the 26th international conference on computer safety, reliability and security (SAFECOMP), Nuremberg, Germany. LNCS 4680 (2007), Springer Verlag p. 238-51
-
(2007)
Proceedings of the 26th international conference on computer safety, reliability and security (SAFECOMP), Nuremberg, Germany. LNCS 4680
-
-
Basagiannis, S.1
Katsaros, P.2
Pombortsis, A.3
-
6
-
-
67649825382
-
-
Castelliccia C, Mykletun E, Tsudik G. Improving secure server performance by rebalancing SSL/TLS handshakes. Cryptology ePrint Archive 2005/037. IACR. http://eprint.iacr.org/2005/037 (accessed 18.08.08).
-
Castelliccia C, Mykletun E, Tsudik G. Improving secure server performance by rebalancing SSL/TLS handshakes. Cryptology ePrint Archive 2005/037. IACR. http://eprint.iacr.org/2005/037 (accessed 18.08.08).
-
-
-
-
8
-
-
4143130116
-
-
accessed 28.12.07
-
CERT coordination center. Denial of service attacks. http://www.cert.org/tech_tips/ denial_of_service.html (accessed 28.12.07).
-
Denial of service attacks
-
-
-
12
-
-
0003096318
-
A logic for reasoning about time and reliability
-
Hansson H., and Jonsson B. A logic for reasoning about time and reliability. Formal Aspects of Computing 6 5 (1994) 512-535
-
(1994)
Formal Aspects of Computing
, vol.6
, Issue.5
, pp. 512-535
-
-
Hansson, H.1
Jonsson, B.2
-
13
-
-
67649829390
-
-
InfraHIP project web site, accessed 21.12.07
-
InfraHIP project web site. http://infrahip.hiit.fi/ (accessed 21.12.07).
-
-
-
-
17
-
-
34548060449
-
Stochastic model checking
-
Bernardo M., and Hillston J. (Eds), Springer
-
Kwiatkowska M., Norman G., and Parker D. Stochastic model checking. In: Bernardo M., and Hillston J. (Eds). Formal methods for the design of computer, communication and software systems: performance evaluation (SFM'07). LNCS 4486 (2007), Springer 220-270
-
(2007)
Formal methods for the design of computer, communication and software systems: performance evaluation (SFM'07). LNCS 4486
, pp. 220-270
-
-
Kwiatkowska, M.1
Norman, G.2
Parker, D.3
-
20
-
-
0035075103
-
A cost-based framework for analysis of DoS in networks
-
Meadows C. A cost-based framework for analysis of DoS in networks. Journal of Computer Security 9 1/2 (2001) 143-164
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 143-164
-
-
Meadows, C.1
-
21
-
-
0037250964
-
Formal methods for cryptographic protocol analysis: emerging issues and trends
-
Meadows C. Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE Journal on Selected Areas in Communications 21 1 (2003) 44-54
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 44-54
-
-
Meadows, C.1
-
22
-
-
67649759831
-
-
PRISM model checker web site, accessed 3.01.08
-
PRISM model checker web site. http://www.prismmodelchecker.org/ (accessed 3.01.08).
-
-
-
-
26
-
-
84872811083
-
-
Smith J, Gonzalez-Nieto JM, Boyd C. Modelling denial of service attacks on JFK with Meadows's cost-based framework. Proceedings of the fourth Australasian information security workshop (AISW-NetSec). CRPIT Series; 2006. p. 125-34.
-
Smith J, Gonzalez-Nieto JM, Boyd C. Modelling denial of service attacks on JFK with Meadows's cost-based framework. Proceedings of the fourth Australasian information security workshop (AISW-NetSec). CRPIT Series; 2006. p. 125-34.
-
-
-
-
27
-
-
79955480114
-
Using coloured petri nets to simulate DoS-resistant protocols
-
University of Aarhus, Denmark
-
Tritilanunt S., Boyd C., Foo E., and Gonzalez Neto J.M. Using coloured petri nets to simulate DoS-resistant protocols. Proceedings of the seventh workshop and tutorial on practical use of coloured petri nets and the CPN tools (2006), University of Aarhus, Denmark
-
(2006)
Proceedings of the seventh workshop and tutorial on practical use of coloured petri nets and the CPN tools
-
-
Tritilanunt, S.1
Boyd, C.2
Foo, E.3
Gonzalez Neto, J.M.4
|