메뉴 건너뛰기




Volumn , Issue , 2009, Pages 46-51

Self-routing denial-of-service resistant capabilities using in-packet bloom filters

Author keywords

[No Author keywords available]

Indexed keywords

DATA STRUCTURES; NETWORK ARCHITECTURE; NETWORK SECURITY; SECURITY SYSTEMS;

EID: 77954925208     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EC2ND.2009.14     Document Type: Conference Paper
Times cited : (35)

References (25)
  • 1
    • 18144411533 scopus 로고    scopus 로고
    • Preventing internet denialof-service with capabilities
    • T. Anderson, T. Roscoe, and D. Wetherall. Preventing internet denialof-service with capabilities. Hotnets II, pages 39-44, 2004.
    • (2004) Hotnets II , pp. 39-44
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3
  • 2
    • 34250668440 scopus 로고    scopus 로고
    • Network capabilities: The good, the bad and the ugly
    • Jan
    • K. Argyraki and D. Cheriton. Network capabilities: The good, the bad and the ugly. ACAi HotNe.ts-IV, Jan 2005.
    • (2005) ACAi HotNe.ts-IV
    • Argyraki, K.1    Cheriton, D.2
  • 4
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 1970.
    • (1970) Commun. ACM
    • Bloom, B.H.1
  • 6
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Commun. ACM, 24(8):533-536, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 8
    • 33846902581 scopus 로고    scopus 로고
    • A path computation element (PCE)based architecture
    • A. Farrel, J.-P. Vasseur, and J. Ash. A path computation element (PCE)based architecture. IETF RFC 4655, 2006.
    • (2006) IETF RFC , pp. 4655
    • Farrel, A.1    Vasseur, J.-P.2    Ash, J.3
  • 15
    • 21844450913 scopus 로고    scopus 로고
    • A system, for authenticated policycompliant routing
    • B. Raghavan and A. C. Snoeren. A system, for authenticated policycompliant routing. SIGCOMM CCR, 34(4): 167-178, 2004.
    • (2004) SIGCOMM CCR , vol.34 , Issue.4 , pp. 167-178
    • Raghavan, B.1    Snoeren, A.C.2
  • 20
    • 47949098846 scopus 로고    scopus 로고
    • A credential-based data path architecture for assurable global networking
    • T. Wolf. A credential-based data path architecture for assurable global networking. In IEEE MlLCOM, 2007.
    • (2007) IEEE MlLCOM
    • Wolf, T.1
  • 21
    • 84999466301 scopus 로고    scopus 로고
    • Security on FPGAs: State-ofthe-art implementations and attacks
    • T. Wollinger, J. Guajardo, and C. Paar. Security on FPGAs: State-ofthe-art implementations and attacks. ACM Trans. Embed. Comput. Syst., 3(3): 534-574, 2004.
    • (2004) ACM Trans. Embed. Comput. Syst. , vol.3 , Issue.3 , pp. 534-574
    • Wollinger, T.1    Guajardo, J.2    Paar, C.3
  • 22
    • 3543097593 scopus 로고    scopus 로고
    • A stateless internet flow filter to mitigate DDoS flooding attacks
    • A. Yaar, A. Perrig, and D. Song. Siff: A stateless internet flow filter to mitigate DDoS flooding attacks. Security and Privacy, 2004.
    • (2004) Security and Privacy
    • Yaar, A.1    Perrig, A.2    Song Siff, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.