-
1
-
-
72449143911
-
-
Aiello, W., Bellovin, S.M., Blaze, M., Canetti, R., Ioannidis, J., Kermoytis, A.D., Reingold, O.: Just Fast Keying: Key Agreement In A Hostile Internet. ACM Trans. on Info. and Syst. Sec. 4, 1-30 (2004)
-
Aiello, W., Bellovin, S.M., Blaze, M., Canetti, R., Ioannidis, J., Kermoytis, A.D., Reingold, O.: Just Fast Keying: Key Agreement In A Hostile Internet. ACM Trans. on Info. and Syst. Sec. 4, 1-30 (2004)
-
-
-
-
2
-
-
84949938425
-
DoS-Resistant Authentication with Client Puzzles
-
Christianson, B, Crispo, B, Malcolm, J.A, Roe, M, eds, Security Protocols 2000, Springer, Heidelberg
-
Aura, T., Nikander, P., Leiwo, J.: DoS-Resistant Authentication with Client Puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170-181. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2133
, pp. 170-181
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
4
-
-
40349087309
-
-
Biham, E., Goren, Y.J., Ishai, Y.: Basing Weak Public-Key Cryptoraphy on Strong One-Way Functions. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 55-72. Springer, Heidelberg (2008)
-
Biham, E., Goren, Y.J., Ishai, Y.: Basing Weak Public-Key Cryptoraphy on Strong One-Way Functions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 55-72. Springer, Heidelberg (2008)
-
-
-
-
5
-
-
24144435673
-
-
Canetti, R., Halevi, S., Steiner, M.: Hardness Amplification of Weakly Verifiable Puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 17-33. Springer, Heidelberg (2005)
-
Canetti, R., Halevi, S., Steiner, M.: Hardness Amplification of Weakly Verifiable Puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 17-33. Springer, Heidelberg (2005)
-
-
-
-
6
-
-
1942443499
-
-
Chen, L., Mao, W.: An Auditable Metering Scheme for Web Advertisement Applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, pp. 475-485. Springer, Heidelberg (2001)
-
Chen, L., Mao, W.: An Auditable Metering Scheme for Web Advertisement Applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 475-485. Springer, Heidelberg (2001)
-
-
-
-
7
-
-
1242321281
-
DDoS Attacks and Defence mechanisms: Classification and State-of-the-Art
-
Douligeris, C., Mitrokotsa, A.: DDoS Attacks and Defence mechanisms: Classification and State-of-the-Art. Computer Networks 44, 643-666 (2004)
-
(2004)
Computer Networks
, vol.44
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
8
-
-
84943235829
-
Pricing via Processing or Combatting Junk Email
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Email. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
9
-
-
72449184949
-
-
Eddy, W.: TCP SYN Flooding Attacks and Common Mitigations. RFC 4987
-
Eddy, W.: TCP SYN Flooding Attacks and Common Mitigations. RFC 4987
-
-
-
-
12
-
-
0024866742
-
Limits on the Provable Consequences of One-Way Permutations
-
STOC
-
Impagliazzo, R., Rudich, S.: Limits on the Provable Consequences of One-Way Permutations. In: ACM Symp. on the Theory of Comp. - STOC 1989, pp. 44-61 (1989)
-
(1989)
ACM Symp. on the Theory of Comp
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
14
-
-
84861587712
-
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks
-
Juels, A., Brainard, J.: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In: ISOC Network and Distributed System Security Symposium, pp. 151-165 (1999)
-
(1999)
ISOC Network and Distributed System Security Symposium
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
16
-
-
0032664157
-
A Formal Framework and Evaluation Method for Network Denial of Service
-
IEEE Computer Society Press, Los Alamitos
-
Meadows, C.: A Formal Framework and Evaluation Method for Network Denial of Service. In: 12th Computer Security Foundations Workshop, pp. 4-13. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
12th Computer Security Foundations Workshop
, pp. 4-13
-
-
Meadows, C.1
-
17
-
-
0035075103
-
A Cost-Based Framework for Analysis of Denial of Service in Networks
-
Meadows, C.: A Cost-Based Framework for Analysis of Denial of Service in Networks. Journal of Computer Security 9, 143-164 (2001)
-
(2001)
Journal of Computer Security
, vol.9
, pp. 143-164
-
-
Meadows, C.1
-
18
-
-
0017959977
-
Secure Communications Over Insecure Channels
-
Merkle, R.: Secure Communications Over Insecure Channels. Communications of the ACM 21, 294-299 (1978)
-
(1978)
Communications of the ACM
, vol.21
, pp. 294-299
-
-
Merkle, R.1
-
19
-
-
11144272176
-
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
-
Mirkovic, J., Martin, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review 34, 39-53 (2004)
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, pp. 39-53
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
20
-
-
3142619105
-
-
Internet Draft October
-
Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol. Internet Draft (October 2007)
-
(2007)
Host Identity Protocol
-
-
Moskowitz, R.1
Nikander, P.2
Jokela, P.3
Henderson, T.4
-
21
-
-
35248832207
-
-
Price, G.: A General Attack Model of Hash-Based Client Puzzles. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, 2898, pp. 319-331. Springer, Heidelberg (2003)
-
Price, G.: A General Attack Model of Hash-Based Client Puzzles. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 319-331. Springer, Heidelberg (2003)
-
-
-
-
23
-
-
84887264252
-
Formalizing Human Ignorance
-
Nguyên, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
-
Rogaway, P.: Formalizing Human Ignorance. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 211-228. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4341
, pp. 211-228
-
-
Rogaway, P.1
-
24
-
-
38049035017
-
-
Schaller, P., Capkun, S., Basin, D.: BAP: Broadcast Authentication Using Cryptographic Puzzles. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 401-419. Springer, Heidelberg (2007)
-
Schaller, P., Capkun, S., Basin, D.: BAP: Broadcast Authentication Using Cryptographic Puzzles. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 401-419. Springer, Heidelberg (2007)
-
-
-
-
25
-
-
84872811083
-
Modelling Denial of Service Attacks on JFK with Meadows's Cost-Based Framework
-
Smith, J., González-Nieto, J.M., Boyd, C.: Modelling Denial of Service Attacks on JFK with Meadows's Cost-Based Framework. In: Proceedings of the 2006 Australasian workshop on Grid computing and e-research, vol. 54, pp. 125-134 (2006)
-
(2006)
Proceedings of the 2006 Australasian workshop on Grid computing and e-research
, vol.54
, pp. 125-134
-
-
Smith, J.1
González-Nieto, J.M.2
Boyd, C.3
-
26
-
-
85132972574
-
Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures
-
Specht, S., Lee, R.: Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures. In: 17th International Conference on Parallel and Distributed Computing Systems, pp. 543-550 (2004)
-
(2004)
17th International Conference on Parallel and Distributed Computing Systems
, pp. 543-550
-
-
Specht, S.1
Lee, R.2
-
27
-
-
38349080863
-
-
Tritilanunt, S., Boyd, C., Foo, E., González Nieto, J.M.: Toward Non-parallelizable Client Puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, 4856, pp. 247-264. Springer, Heidelberg (2007)
-
Tritilanunt, S., Boyd, C., Foo, E., González Nieto, J.M.: Toward Non-parallelizable Client Puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 247-264. Springer, Heidelberg (2007)
-
-
-
-
28
-
-
14844300104
-
New Client Puzzle Outsourcing Techniques for DoS Resistance
-
ACM Press, New York
-
Waters, B., Juels, A., Halderman, J.A., Felten, E.W.: New Client Puzzle Outsourcing Techniques for DoS Resistance. In: 11th ACM Conference on Computer and Communication Security - CCS, pp. 246-256. ACM Press, New York (2004)
-
(2004)
11th ACM Conference on Computer and Communication Security - CCS
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
|