메뉴 건너뛰기




Volumn 5912 LNCS, Issue , 2009, Pages 505-523

Security notions and generic constructions for client puzzles

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT PUZZLES; COMPUTATIONAL PROBLEM; DENIAL OF SERVICE ATTACKS; DOS ATTACKS; FORMAL MODEL; GENERIC CONSTRUCTION; SECURITY DEFINITIONS; SECURITY NOTION;

EID: 72449146821     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10366-7_30     Document Type: Conference Paper
Times cited : (32)

References (28)
  • 1
    • 72449143911 scopus 로고    scopus 로고
    • Aiello, W., Bellovin, S.M., Blaze, M., Canetti, R., Ioannidis, J., Kermoytis, A.D., Reingold, O.: Just Fast Keying: Key Agreement In A Hostile Internet. ACM Trans. on Info. and Syst. Sec. 4, 1-30 (2004)
    • Aiello, W., Bellovin, S.M., Blaze, M., Canetti, R., Ioannidis, J., Kermoytis, A.D., Reingold, O.: Just Fast Keying: Key Agreement In A Hostile Internet. ACM Trans. on Info. and Syst. Sec. 4, 1-30 (2004)
  • 2
    • 84949938425 scopus 로고    scopus 로고
    • DoS-Resistant Authentication with Client Puzzles
    • Christianson, B, Crispo, B, Malcolm, J.A, Roe, M, eds, Security Protocols 2000, Springer, Heidelberg
    • Aura, T., Nikander, P., Leiwo, J.: DoS-Resistant Authentication with Client Puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170-181. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2133 , pp. 170-181
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 4
    • 40349087309 scopus 로고    scopus 로고
    • Biham, E., Goren, Y.J., Ishai, Y.: Basing Weak Public-Key Cryptoraphy on Strong One-Way Functions. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 55-72. Springer, Heidelberg (2008)
    • Biham, E., Goren, Y.J., Ishai, Y.: Basing Weak Public-Key Cryptoraphy on Strong One-Way Functions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 55-72. Springer, Heidelberg (2008)
  • 5
    • 24144435673 scopus 로고    scopus 로고
    • Canetti, R., Halevi, S., Steiner, M.: Hardness Amplification of Weakly Verifiable Puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 17-33. Springer, Heidelberg (2005)
    • Canetti, R., Halevi, S., Steiner, M.: Hardness Amplification of Weakly Verifiable Puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 17-33. Springer, Heidelberg (2005)
  • 6
    • 1942443499 scopus 로고    scopus 로고
    • Chen, L., Mao, W.: An Auditable Metering Scheme for Web Advertisement Applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, pp. 475-485. Springer, Heidelberg (2001)
    • Chen, L., Mao, W.: An Auditable Metering Scheme for Web Advertisement Applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 475-485. Springer, Heidelberg (2001)
  • 7
    • 1242321281 scopus 로고    scopus 로고
    • DDoS Attacks and Defence mechanisms: Classification and State-of-the-Art
    • Douligeris, C., Mitrokotsa, A.: DDoS Attacks and Defence mechanisms: Classification and State-of-the-Art. Computer Networks 44, 643-666 (2004)
    • (2004) Computer Networks , vol.44 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 8
    • 84943235829 scopus 로고
    • Pricing via Processing or Combatting Junk Email
    • Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
    • Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Email. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 9
    • 72449184949 scopus 로고    scopus 로고
    • Eddy, W.: TCP SYN Flooding Attacks and Common Mitigations. RFC 4987
    • Eddy, W.: TCP SYN Flooding Attacks and Common Mitigations. RFC 4987
  • 12
    • 0024866742 scopus 로고
    • Limits on the Provable Consequences of One-Way Permutations
    • STOC
    • Impagliazzo, R., Rudich, S.: Limits on the Provable Consequences of One-Way Permutations. In: ACM Symp. on the Theory of Comp. - STOC 1989, pp. 44-61 (1989)
    • (1989) ACM Symp. on the Theory of Comp , pp. 44-61
    • Impagliazzo, R.1    Rudich, S.2
  • 14
    • 84861587712 scopus 로고    scopus 로고
    • Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks
    • Juels, A., Brainard, J.: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In: ISOC Network and Distributed System Security Symposium, pp. 151-165 (1999)
    • (1999) ISOC Network and Distributed System Security Symposium , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 16
    • 0032664157 scopus 로고    scopus 로고
    • A Formal Framework and Evaluation Method for Network Denial of Service
    • IEEE Computer Society Press, Los Alamitos
    • Meadows, C.: A Formal Framework and Evaluation Method for Network Denial of Service. In: 12th Computer Security Foundations Workshop, pp. 4-13. IEEE Computer Society Press, Los Alamitos (1999)
    • (1999) 12th Computer Security Foundations Workshop , pp. 4-13
    • Meadows, C.1
  • 17
    • 0035075103 scopus 로고    scopus 로고
    • A Cost-Based Framework for Analysis of Denial of Service in Networks
    • Meadows, C.: A Cost-Based Framework for Analysis of Denial of Service in Networks. Journal of Computer Security 9, 143-164 (2001)
    • (2001) Journal of Computer Security , vol.9 , pp. 143-164
    • Meadows, C.1
  • 18
    • 0017959977 scopus 로고
    • Secure Communications Over Insecure Channels
    • Merkle, R.: Secure Communications Over Insecure Channels. Communications of the ACM 21, 294-299 (1978)
    • (1978) Communications of the ACM , vol.21 , pp. 294-299
    • Merkle, R.1
  • 21
    • 35248832207 scopus 로고    scopus 로고
    • Price, G.: A General Attack Model of Hash-Based Client Puzzles. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, 2898, pp. 319-331. Springer, Heidelberg (2003)
    • Price, G.: A General Attack Model of Hash-Based Client Puzzles. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 319-331. Springer, Heidelberg (2003)
  • 23
    • 84887264252 scopus 로고    scopus 로고
    • Formalizing Human Ignorance
    • Nguyên, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
    • Rogaway, P.: Formalizing Human Ignorance. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 211-228. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4341 , pp. 211-228
    • Rogaway, P.1
  • 24
    • 38049035017 scopus 로고    scopus 로고
    • Schaller, P., Capkun, S., Basin, D.: BAP: Broadcast Authentication Using Cryptographic Puzzles. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 401-419. Springer, Heidelberg (2007)
    • Schaller, P., Capkun, S., Basin, D.: BAP: Broadcast Authentication Using Cryptographic Puzzles. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 401-419. Springer, Heidelberg (2007)
  • 27
    • 38349080863 scopus 로고    scopus 로고
    • Tritilanunt, S., Boyd, C., Foo, E., González Nieto, J.M.: Toward Non-parallelizable Client Puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, 4856, pp. 247-264. Springer, Heidelberg (2007)
    • Tritilanunt, S., Boyd, C., Foo, E., González Nieto, J.M.: Toward Non-parallelizable Client Puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 247-264. Springer, Heidelberg (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.