-
1
-
-
18144411533
-
Preventing internet denialof-service with capabilities
-
T. Anderson, T. Roscoe, and D. Wetherall. Preventing internet denialof-service with capabilities. Hotnets II, pages 39-44, 2004.
-
(2004)
Hotnets II
, pp. 39-44
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
2
-
-
34250668440
-
Network capabilities: The good, the bad and the ugly
-
Jan
-
K. Argyraki and D. Cheriton. Network capabilities: The good, the bad and the ugly. ACAi HotNe.ts-IV, Jan 2005.
-
(2005)
ACAi HotNe.ts-IV
-
-
Argyraki, K.1
Cheriton, D.2
-
3
-
-
84891624492
-
Off by default
-
Aug
-
H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker. Off by default. ACM HotNets IV, Aug 2005.
-
(2005)
ACM HotNets IV
-
-
Ballani, H.1
Chawathe, Y.2
Ratnasamy, S.3
Roscoe, T.4
Shenker, S.5
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 1970.
-
(1970)
Commun. ACM
-
-
Bloom, B.H.1
-
5
-
-
44249126961
-
A protection architecture for enterprise networks
-
Berkeley, CA, USA
-
M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker. SANE: a protection architecture for enterprise networks. In USENIX-SS'06, Berkeley, CA, USA, 2006.
-
(2006)
USENIX-SS'06
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M.J.4
Boneh, D.5
McKeown, N.6
Shenker Sane, S.7
-
6
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Commun. ACM, 24(8):533-536, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
8
-
-
33846902581
-
A path computation element (PCE)based architecture
-
A. Farrel, J.-P. Vasseur, and J. Ash. A path computation element (PCE)based architecture. IETF RFC 4655, 2006.
-
(2006)
IETF RFC
, pp. 4655
-
-
Farrel, A.1
Vasseur, J.-P.2
Ash, J.3
-
9
-
-
48249096906
-
-
SASC 08, Feb
-
D. Hwang, M. Chaney, S. Karanam, N. Ton, and K. Gaj. Comparison of FPGA-targeted hardware implementations of eSTREAM stream cipher candidates. SASC 08, Feb 2008.
-
(2008)
Comparison of FPGA-targeted Hardware Implementations of ESTREAM Stream Cipher Candidates.
-
-
Hwang, D.1
Chaney, M.2
Karanam, S.3
Ton, N.4
Gaj, K.5
-
10
-
-
74549116447
-
LIPSIN: Line speed publish/subscribe inter-networking
-
Aug.
-
P. Jokela, A. Zahemszky, C. Esteve, S. Arianfar, and P. Nikander. LIPSIN: Line speed publish/subscribe inter-networking. In Proceedings of ACM SIGCOMM'09, Barcelona, Spain, Aug. 2009.
-
(2009)
Proceedings of ACM SIGCOMM'09, Barcelona, Spain
-
-
Jokela, P.1
Zahemszky, A.2
Esteve, C.3
Arianfar, S.4
Nikander, P.5
-
14
-
-
36949036429
-
Protecting connection setup from denial-of-capability attacks
-
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y. Hu. Portcullis: Protecting connection setup from denial-of-capability attacks. In Sigcomm, 2007.
-
(2007)
Sigcomm
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu Portcullis, Y.6
-
15
-
-
21844450913
-
A system, for authenticated policycompliant routing
-
B. Raghavan and A. C. Snoeren. A system, for authenticated policycompliant routing. SIGCOMM CCR, 34(4): 167-178, 2004.
-
(2004)
SIGCOMM CCR
, vol.34
, Issue.4
, pp. 167-178
-
-
Raghavan, B.1
Snoeren, A.C.2
-
18
-
-
35248831179
-
Using hard AI problems for security
-
L. Von Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. LNICS, pages 294-311, 2003.
-
(2003)
LNICS
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford Captcha, J.4
-
20
-
-
47949098846
-
A credential-based data path architecture for assurable global networking
-
T. Wolf. A credential-based data path architecture for assurable global networking. In IEEE MlLCOM, 2007.
-
(2007)
IEEE MlLCOM
-
-
Wolf, T.1
-
21
-
-
84999466301
-
Security on FPGAs: State-ofthe-art implementations and attacks
-
T. Wollinger, J. Guajardo, and C. Paar. Security on FPGAs: State-ofthe-art implementations and attacks. ACM Trans. Embed. Comput. Syst., 3(3): 534-574, 2004.
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, Issue.3
, pp. 534-574
-
-
Wollinger, T.1
Guajardo, J.2
Paar, C.3
-
22
-
-
3543097593
-
A stateless internet flow filter to mitigate DDoS flooding attacks
-
A. Yaar, A. Perrig, and D. Song. Siff: A stateless internet flow filter to mitigate DDoS flooding attacks. Security and Privacy, 2004.
-
(2004)
Security and Privacy
-
-
Yaar, A.1
Perrig, A.2
Song Siff, D.3
-
23
-
-
85126499169
-
A 4D network control plane
-
H. Yan, D. A. Maltz, T. S. E. Ng, H. Gogineni, H. Zhang, and Z. Cai. Tesseract: A 4D network control plane. In NSDI'07, 2007.
-
(2007)
NSDI'07
-
-
Yan, H.1
Maltz, D.A.2
Ng, T.S.E.3
Gogineni, H.4
Zhang, H.5
Cai Tesseract, Z.6
-
24
-
-
57949103947
-
A DoS-limiting network architecture
-
X. Yang, D. Wetherall, and T. Anderson. TVA: A DoS-limiting network architecture. IEEE/ACM Trans, on Networking, 16(6): 1267-1280, 2008.
-
(2008)
IEEE/ACM Trans, on Networking
, vol.16
, Issue.6
, pp. 1267-1280
-
-
Yang, X.1
Wetherall, D.2
Anderson Tva, T.3
|