-
1
-
-
84945119254
-
Entity authentication and key distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
84949230533
-
Key agreement protocols and their security analysis
-
Darnell, M.J, ed, Cryptography and Coding 1997, Springer, Heidelberg
-
Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1355
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
3
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
4
-
-
33745179557
-
HMQV: A high-performance secure Diffie-Hellman protocol
-
Shoup, V, ed, CRYPTO 2005, Springer, Hei-delberg
-
Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Hei-delberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
5
-
-
38149012093
-
-
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, 4784, pp. 1-16. Springer, Heidelberg (2007)
-
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
-
-
-
-
7
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auctions
-
IEEE Press, Los Alamitos
-
Wang, X., Reiter, M.: Defending against denial-of-service attacks with puzzle auctions. In: Proc. 2003 IEEE Symposium on Security and Privacy (SP 2003), pp. 78-92. IEEE Press, Los Alamitos (2003)
-
(2003)
Proc. 2003 IEEE Symposium on Security and Privacy (SP 2003)
, pp. 78-92
-
-
Wang, X.1
Reiter, M.2
-
8
-
-
0005966913
-
Stateless connections
-
Han, Y, Okamoto, T, Qing, S, eds, ICICS 1997, Springer, Heidelberg
-
Aura, T., Nikander, P.: Stateless connections. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 87-97. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1334
, pp. 87-97
-
-
Aura, T.1
Nikander, P.2
-
9
-
-
0032664157
-
A formal framework and evaluation method for network denial of service
-
IEEE Computer Society Press, Los Alamitos
-
Meadows, C.: A formal framework and evaluation method for network denial of service. In: Proc. 1999 IEEE Computer Security Foundations Workshop (CSFW), vol. 4, IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
Proc. 1999 IEEE Computer Security Foundations Workshop (CSFW)
, vol.4
-
-
Meadows, C.1
-
11
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie, W., van Oorschot, P., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2(2), 107-125 (1992)
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.2
Wiener, M.J.3
-
12
-
-
84872811083
-
Modelling denial of service attacks on JFK with Meadows's cost-based framework
-
Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, Susilo, W, eds, Australian Computer Society
-
Smith, J., Gonzalez-Nieto, J., Boyd, C.: Modelling denial of service attacks on JFK with Meadows's cost-based framework. In: Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C., Susilo, W. (eds.) Proc. 4th Australasian Information Security Workshop-Network Security (AISW-NetSec) 2006. CRPIT, vol. 54, pp. 125-134. Australian Computer Society (2006)
-
(2006)
Proc. 4th Australasian Information Security Workshop-Network Security (AISW-NetSec) 2006. CRPIT
, vol.54
, pp. 125-134
-
-
Smith, J.1
Gonzalez-Nieto, J.2
Boyd, C.3
-
14
-
-
35248816546
-
SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Krawczyk, H.: SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400-425. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 400-425
-
-
Krawczyk, H.1
-
16
-
-
3142632089
-
Just Fast Keying: Key agreement in a hostile Internet
-
Aiello, W., Bellovin, S.M., Blaze, M., Canetti, R., Ioannidis, J., Keromytis, A.D., Reingold, O.: Just Fast Keying: Key agreement in a hostile Internet. ACM Transactions on Information and System Security 7(2), 1-30 (2004)
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 1-30
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
17
-
-
33645699328
-
On the plausible deniability feature of Internet protocols
-
manuscript
-
Mao, W., Paterson, K.G.: On the plausible deniability feature of Internet protocols (manuscript, 2002)
-
(2002)
-
-
Mao, W.1
Paterson, K.G.2
-
18
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
21
-
-
85045893940
-
Moderately hard, memory-bound functions
-
Internet Society
-
Abadi, M., Burrows, M., Manasse, M., Wobber, T.: Moderately hard, memory-bound functions. In: Proc. Internet Society Network and Distributed System Security Symposium (NDSS 2003). Internet Society (2003)
-
(2003)
Proc. Internet Society Network and Distributed System Security Symposium (NDSS
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
22
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
ACM, New York
-
Waters, B., Juels, A., Halderman, J.A., Felten, E.W.: New client puzzle outsourcing techniques for DoS resistance. In: Proc. 11th ACM Conference on Computer and Communications Security (CCS), pp. 246-256. ACM, New York (2004)
-
(2004)
Proc. 11th ACM Conference on Computer and Communications Security (CCS)
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
-
23
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
Christianson, B, Crispo, B, Malcolm, J.A, Roe, M, eds, Security Protocols 2000, Springer, Heidelberg
-
Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170-177. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2133
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
25
-
-
14844286782
-
Proofs of work and bread pudding protocols
-
Preneel, B, ed, Kluwer Academic Publishers, Dordrecht
-
Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols. In: Preneel, B. (ed.) Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. IFIP Conference Proceedings, vol. 152, pp. 258-272. Kluwer Academic Publishers, Dordrecht (1999)
-
(1999)
Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. IFIP Conference Proceedings
, vol.152
, pp. 258-272
-
-
Jakobsson, M.1
Juels, A.2
-
26
-
-
38649136602
-
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
-
Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. Designs, Codes and Cryptography 46(3), 329-342 (2008)
-
(2008)
Designs, Codes and Cryptography
, vol.46
, Issue.3
, pp. 329-342
-
-
Ustaoglu, B.1
-
27
-
-
84937389342
-
-
Okamoto, T., Pointcheval, D.: The gap-problems: A new class of problems for the security of cryptographic schemes. In: Kim, K. (ed.) PKC 2001. LNCS, 1992, pp. 104-118. Springer, Heidelberg (2001)
-
Okamoto, T., Pointcheval, D.: The gap-problems: A new class of problems for the security of cryptographic schemes. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001)
-
-
-
-
28
-
-
3142619105
-
-
Internet-Draft February
-
Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.R.: Host Identity Protocol, Internet-Draft (February 2004)
-
(2004)
Host Identity Protocol
-
-
Moskowitz, R.1
Nikander, P.2
Jokela, P.3
Henderson, T.R.4
|