-
2
-
-
33749991591
-
Lightweight Email Signatures
-
SCN '06: 5th International Conference on Security and Cryptography for Networks, of, Maiori, Italy
-
B. Adida, D. Chau, S. Hohenberger, and R. L. Rivest. Lightweight Email Signatures. In SCN '06: 5th International Conference on Security and Cryptography for Networks, vol. 4116 of Lecture Notes in Computer Science, pp. 288-302, 2006. Maiori, Italy.
-
(2006)
Lecture Notes in Computer Science
, vol.4116
, pp. 288-302
-
-
Adida, B.1
Chau, D.2
Hohenberger, S.3
Rivest, R.L.4
-
3
-
-
65249144934
-
Holding the Internet Accountable
-
Atlanta, GA, November
-
D. G. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker. Holding the Internet Accountable. In Proceedings of the 6th ACM Workshop on Hot Topics in Networking, Atlanta, GA, November 2007.
-
(2007)
Proceedings of the 6th ACM Workshop on Hot Topics in Networking
-
-
Andersen, D.G.1
Balakrishnan, H.2
Feamster, N.3
Koponen, T.4
Moon, D.5
Shenker, S.6
-
5
-
-
47649087420
-
-
Version 4 Routers, RFC 1812, IETF
-
F. Baker. Requirements for IP Version 4 Routers, 1995. RFC 1812, IETF.
-
(1995)
Requirements for IP
-
-
Baker, F.1
-
6
-
-
3042683432
-
Message Authentication Using Hash Functions: The HMAC Construction
-
Spring
-
M. Bellare, R. Canetti, and H. Krawczyk. Message Authentication Using Hash Functions: the HMAC Construction. CryptoBytes, 2(1):12-15, Spring 1996.
-
(1996)
CryptoBytes
, vol.2
, Issue.1
, pp. 12-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
7
-
-
0037623983
-
Identity-based Encryption from the Weil Pairing
-
D. Boneh and M. Franklin. Identity-based Encryption from the Weil Pairing. SIAM Journal of Computation, 32(3):586-615, 2003.
-
(2003)
SIAM Journal of Computation
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
77950151506
-
An Identity-based Encryption Scheme Based on Quadratic Residues
-
8th IMA International Conference on Cryptography and Coding, of
-
C. Cocks. An Identity-based Encryption Scheme Based on Quadratic Residues. In 8th IMA International Conference on Cryptography and Coding, vol. 2260 of Lecture Notes in Computer Science, pp. 360-363, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
9
-
-
70350660475
-
-
P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese. IEEE 802.1X Remote Authentication Dial In User Service Usage Guidelines, Sept. 2003. RFC 3580.
-
P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese. IEEE 802.1X Remote Authentication Dial In User Service Usage Guidelines, Sept. 2003. RFC 3580.
-
-
-
-
10
-
-
0034581037
-
Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure
-
C. Ellison and B. Schneier. Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure. In Computer Security Journal, pages 1-7, 2000.
-
(2000)
Computer Security Journal
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
12
-
-
52149120953
-
CLL: A Cryptographic Link Layer for Local Area Networks
-
SCN '08: 6th International Conference on Security and Cryptography for Networks, of, Amalfi, Italy
-
Y. I. Jerschow, C. Lochert, B. Scheuermann, and M. Mauve. CLL: A Cryptographic Link Layer for Local Area Networks. In SCN '08: 6th International Conference on Security and Cryptography for Networks, vol. 5229 of Lecture Notes in Computer Science, pp. 21-38, 2008. Amalfi, Italy.
-
(2008)
Lecture Notes in Computer Science
, vol.5229
, pp. 21-38
-
-
Jerschow, Y.I.1
Lochert, C.2
Scheuermann, B.3
Mauve, M.4
-
14
-
-
85083279650
-
Passport: Secure and Adoptable Source Authentication
-
Berkeley, CA, USA, USENIX Association
-
X. Liu, A. Li, X. Yang, and D. Wetherall. Passport: Secure and Adoptable Source Authentication. In USENIX/ACM Symposium on Networked Systems Design and Implementation, pages 365-378, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
USENIX/ACM Symposium on Networked Systems Design and Implementation
, pp. 365-378
-
-
Liu, X.1
Li, A.2
Yang, X.3
Wetherall, D.4
-
15
-
-
38049148364
-
Efficient and Secure Source Authentication with Packet Passports
-
Berkeley, CA, USA, USENIX Association. San Jose, CA
-
X. Liu, X. Yang, D. Wetherall, and T. Anderson. Efficient and Secure Source Authentication with Packet Passports. In 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet, pp. 2-9, Berkeley, CA, USA, 2006. USENIX Association. San Jose, CA.
-
(2006)
2nd Conference on Steps to Reducing Unwanted Traffic on the Internet
, pp. 2-9
-
-
Liu, X.1
Yang, X.2
Wetherall, D.3
Anderson, T.4
-
16
-
-
11144272176
-
A Taxonomy of DDoS Attack and DDoS Defense Mmechanisms
-
New York, NY, USA, ACM Press. Portland, Oregon
-
J. Mirkovic and P. Reiher. A Taxonomy of DDoS Attack and DDoS Defense Mmechanisms. In ACM SIGCOMM, pp. 39-53, New York, NY, USA, 2004. ACM Press. Portland, Oregon.
-
(2004)
ACM SIGCOMM
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
18
-
-
36949036429
-
Protecting Connection Setup from Denial-of-Capability Attacks
-
ACM Press, Kyoto, Japan
-
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y.-C. Hu. Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks. In ACM SIGCOMM, pp. 289-300. ACM Press, 2007. Kyoto, Japan.
-
(2007)
ACM SIGCOMM
, pp. 289-300
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Portcullis, Y.-C.H.6
-
19
-
-
34147099073
-
Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems
-
T. Peng, C. Leckie, and K. Ramamohanarao. Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Computing Surveys, 39(1):3, 2007.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
, pp. 3
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
21
-
-
0033650584
-
Practical Network Support for IP Traceback
-
ACM Press, Stockholm, Sweden
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical Network Support for IP Traceback. In ACM SIGCOMM, pages 295-306. ACM Press, 2000. Stockholm, Sweden.
-
(2000)
ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
22
-
-
52149087712
-
An Identity-based Key Agreement Protocol for the Network Layer
-
SCN '08: 6th International Conference on Security and Cryptography for Networks, of, Amalfi, Italy
-
C. Schridde, M. Smith, and B. Freisleben. An Identity-based Key Agreement Protocol for the Network Layer. In SCN '08: 6th International Conference on Security and Cryptography for Networks, vol. 5229 of Lecture Notes in Computer Science, pp. 409-422, 2008. Amalfi, Italy.
-
(2008)
Lecture Notes in Computer Science
, vol.5229
, pp. 409-422
-
-
Schridde, C.1
Smith, M.2
Freisleben, B.3
-
23
-
-
85020598353
-
Identity-based Cryptosystems and Signature Schemes
-
A. Shamir. Identity-based Cryptosystems and Signature Schemes. CRYPTO 1984 Advances in Crytology, 196:47-53, 1984.
-
(1984)
CRYPTO 1984 Advances in Crytology
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
24
-
-
84910623624
-
Domain-based Administration of Identity-based Cryptosystems for Secure E-Mail and IPSEC
-
Berkeley, CA, USA, USENIX Association
-
D. K. Smetters and G. Durfee. Domain-based Administration of Identity-based Cryptosystems for Secure E-Mail and IPSEC. In Proceedings of the 12th USENIX Security Symposium, pages 15-19, Berkeley, CA, USA, 2003. USENIX Association.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 15-19
-
-
Smetters, D.K.1
Durfee, G.2
|