메뉴 건너뛰기




Volumn 5594 LNCS, Issue , 2009, Pages 389-406

Towards denial-of-service-resilient key agreement protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED KEY AGREEMENT; AUTHENTICATED KEY AGREEMENT PROTOCOLS; CLIENT PUZZLES; DENIAL OF SERVICE; FORMAL DEFINITION; HOSTILE ENVIRONMENTS; KEY AGREEMENT PROTOCOL;

EID: 70350639691     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02620-1_27     Document Type: Conference Paper
Times cited : (16)

References (28)
  • 1
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Darnell, M.J, ed, Cryptography and Coding 1997, Springer, Heidelberg
    • Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1355
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 3
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 4
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure Diffie-Hellman protocol
    • Shoup, V, ed, CRYPTO 2005, Springer, Hei-delberg
    • Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Hei-delberg (2005)
    • (2005) LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 5
    • 38149012093 scopus 로고    scopus 로고
    • LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, 4784, pp. 1-16. Springer, Heidelberg (2007)
    • LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
  • 7
    • 0038825046 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions
    • IEEE Press, Los Alamitos
    • Wang, X., Reiter, M.: Defending against denial-of-service attacks with puzzle auctions. In: Proc. 2003 IEEE Symposium on Security and Privacy (SP 2003), pp. 78-92. IEEE Press, Los Alamitos (2003)
    • (2003) Proc. 2003 IEEE Symposium on Security and Privacy (SP 2003) , pp. 78-92
    • Wang, X.1    Reiter, M.2
  • 8
    • 0005966913 scopus 로고    scopus 로고
    • Stateless connections
    • Han, Y, Okamoto, T, Qing, S, eds, ICICS 1997, Springer, Heidelberg
    • Aura, T., Nikander, P.: Stateless connections. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 87-97. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1334 , pp. 87-97
    • Aura, T.1    Nikander, P.2
  • 9
    • 0032664157 scopus 로고    scopus 로고
    • A formal framework and evaluation method for network denial of service
    • IEEE Computer Society Press, Los Alamitos
    • Meadows, C.: A formal framework and evaluation method for network denial of service. In: Proc. 1999 IEEE Computer Security Foundations Workshop (CSFW), vol. 4, IEEE Computer Society Press, Los Alamitos (1999)
    • (1999) Proc. 1999 IEEE Computer Security Foundations Workshop (CSFW) , vol.4
    • Meadows, C.1
  • 12
    • 84872811083 scopus 로고    scopus 로고
    • Modelling denial of service attacks on JFK with Meadows's cost-based framework
    • Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, Susilo, W, eds, Australian Computer Society
    • Smith, J., Gonzalez-Nieto, J., Boyd, C.: Modelling denial of service attacks on JFK with Meadows's cost-based framework. In: Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C., Susilo, W. (eds.) Proc. 4th Australasian Information Security Workshop-Network Security (AISW-NetSec) 2006. CRPIT, vol. 54, pp. 125-134. Australian Computer Society (2006)
    • (2006) Proc. 4th Australasian Information Security Workshop-Network Security (AISW-NetSec) 2006. CRPIT , vol.54 , pp. 125-134
    • Smith, J.1    Gonzalez-Nieto, J.2    Boyd, C.3
  • 14
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Krawczyk, H.: SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400-425. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 400-425
    • Krawczyk, H.1
  • 17
    • 33645699328 scopus 로고    scopus 로고
    • On the plausible deniability feature of Internet protocols
    • manuscript
    • Mao, W., Paterson, K.G.: On the plausible deniability feature of Internet protocols (manuscript, 2002)
    • (2002)
    • Mao, W.1    Paterson, K.G.2
  • 18
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
    • Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 23
    • 84949938425 scopus 로고    scopus 로고
    • DOS-resistant authentication with client puzzles
    • Christianson, B, Crispo, B, Malcolm, J.A, Roe, M, eds, Security Protocols 2000, Springer, Heidelberg
    • Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170-177. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2133 , pp. 170-177
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 26
    • 38649136602 scopus 로고    scopus 로고
    • Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
    • Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. Designs, Codes and Cryptography 46(3), 329-342 (2008)
    • (2008) Designs, Codes and Cryptography , vol.46 , Issue.3 , pp. 329-342
    • Ustaoglu, B.1
  • 27
    • 84937389342 scopus 로고    scopus 로고
    • Okamoto, T., Pointcheval, D.: The gap-problems: A new class of problems for the security of cryptographic schemes. In: Kim, K. (ed.) PKC 2001. LNCS, 1992, pp. 104-118. Springer, Heidelberg (2001)
    • Okamoto, T., Pointcheval, D.: The gap-problems: A new class of problems for the security of cryptographic schemes. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.