-
1
-
-
85175133153
-
-
March, URL
-
ACME Labs. http load, March 2006. URL: http://www.acme.com/software/ httpload/.
-
(2006)
ACME Labs. Http Load
-
-
-
2
-
-
0005966913
-
Stateless connections
-
T. Aura and P. Nikander. Stateless connections. In Y. Han, T. Okamoto, and S. Qing, editors, Proceedings of the First International Conference on Information and Communications Security (ICICS) 1997, volume 1334 of LNCS, pages 87-97. Springer, 1997. (Pubitemid 127148037)
-
(1997)
Lecture Notes in Computer Science
, Issue.1334
, pp. 87-97
-
-
Aura, T.1
Nikander, P.2
-
3
-
-
84949938425
-
DOS-Resistant Authentication with Client Puzzles
-
Security Protocols
-
T. Aura, P. Nikander, and J. Leiwo. DoS-resistant authentication with client puzzles. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols: 8th International Workshop, volume 2133 of LNCS, pages 170-177. Springer, 2000. (Pubitemid 33347515)
-
(2001)
Lecture Notes in Computer Science
, Issue.2133
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
6
-
-
44449163915
-
Proving tight security for rabin-williams signatures
-
DOI 10.1007/978-3-540-78967-3-5, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
D. J. Bernstein. Proving tight security for Rabin-Williams signatures. In N. Smart, editor, Advances in Cryptology-Proc. EUROCRYPT 2008, volume 4965 of LNCS, pages 70-87. Springer, 2008. (Pubitemid 351762824)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 70-87
-
-
Bernstein, D.J.1
-
7
-
-
34247378261
-
Improving secure server performance by Re-balancing SSL/TLS handshakes
-
DOI 10.1145/1128817.1128826, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
C. Castelluccia, E. Mykletun, and G. Tsudik. Improving secure server performance by re-balancing SSL/TLS handshakes. In Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pages 26-34. ACM, 2006. (Pubitemid 46644723)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 26-34
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
8
-
-
79956027674
-
-
URL:, 3 May
-
CERT. Denial of service attacks. URL: http://www.cert.org/techtips/ denialofservice.html 3 May 2010.
-
(2010)
Denial of Service Attacks
-
-
-
9
-
-
72449146821
-
Security notions and generic constructions for client puzzles
-
M. Matsui, editor, volume 5912 of LNCS, Springer
-
L. Chen, P. Morrissey, N. P. Smart, and B. Warinschi. Security notions and generic constructions for client puzzles. In M. Matsui, editor, Advances in Cryptology - Proc. ASIACRYPT 2009, volume 5912 of LNCS, pages 505-523. Springer, 2009.
-
(2009)
Advances in Cryptology - Proc. ASIACRYPT 2009
, pp. 505-523
-
-
Chen, L.1
Morrissey, P.2
Smart, N.P.3
Warinschi, B.4
-
10
-
-
33745212646
-
Performance analysis of TLS web servers
-
C. Coarfa, P. Druschel, and D. Wallach. Performance analysis of TLS web servers. ACM Transactions on Computer Systems, 24(1):39-69, 2006.
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, Issue.1
, pp. 39-69
-
-
Coarfa, C.1
Druschel, P.2
Wallach, D.3
-
12
-
-
25644445353
-
Design and implementation of network puzzles
-
IEEE
-
W. Feng, E. Kaiser, and A. Luu. Design and implementation of network puzzles. In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, volume 4, pages 2372-2382. IEEE, 2005.
-
(2005)
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
, vol.4
, pp. 2372-2382
-
-
Feng, W.1
Kaiser, E.2
Luu, A.3
-
13
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen message attacks
-
April
-
S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen message attacks. SIAM Journal on Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
15
-
-
0004077031
-
Photuris: Session-key management protocol
-
March, URL
-
P. Karn and W. A. Simpson. Photuris: Session-key management protocol, March 1999. RFC 2522. URL: http://www.ietf.org/rfc/rfc2522.txt.
-
(1999)
RFC
, vol.2522
-
-
Karn, P.1
Simpson, W.A.2
-
16
-
-
33746646599
-
Internet Key Exchange (IKEv2) protocol
-
December, URL
-
C. Kaufman. Internet Key Exchange (IKEv2) protocol, December 2005. RFC 4306. URL: http://www.ietf.org/rfc/rfc4306.txt.
-
(2005)
RFC
, vol.4306
-
-
Kaufman, C.1
-
17
-
-
70349396267
-
Requirements for client puzzles to defeat the denial of service and the distributed denial of service attacks
-
V. Laurens, A. El-Saddik, and A. Nayak. Requirements for client puzzles to defeat the denial of service and the distributed denial of service attacks. International Arab Journal of Information Technology, 3(4):326{333, 2006.
-
(2006)
International Arab Journal of Information Technology
, vol.3
, Issue.4
, pp. 326-333
-
-
Laurens, V.1
El-Saddik, A.2
Nayak, A.3
-
19
-
-
0035075103
-
A cost-based framework for analysis of denial of service in networks
-
C. Meadows. A cost-based framework for analysis of denial of service networks. Journal of Computer Security, 9(1/2):143{164, 2001. (Pubitemid 32286900)
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 143-164
-
-
Meadows, C.1
-
20
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS), 24(2):115-139, 2006.
-
(2006)
ACM Transactions on Computer Systems (TOCS)
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
22
-
-
84872811083
-
Modelling denial of service attacks on JFK with Meadows's cost-based framework
-
Australian Computer Society, Inc.
-
J. Smith, J. González Nieto, and C. Boyd. Modelling denial of service attacks on JFK with Meadows's cost-based framework. In Proceedings of the 2006 Australasian Workshops on Grid Computing and e-research, volume 54, pages 125-134. Australian Computer Society, Inc., 2006.
-
(2006)
Proceedings of the 2006 Australasian Workshops on Grid Computing and E-research
, vol.54
, pp. 125-134
-
-
Smith, J.1
González Nieto, J.2
Boyd, C.3
-
23
-
-
79956003692
-
Denial of service resistance in key establishment
-
J. Smith, S. Tritilanunt, C. Boyd, J. González Nieto, and E. Foo. Denial of service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1):59-71, 2007.
-
(2007)
International Journal of Wireless and Mobile Computing
, vol.2
, Issue.1
, pp. 59-71
-
-
Smith, J.1
Tritilanunt, S.2
Boyd, C.3
González Nieto, J.4
Foo, E.5
-
24
-
-
79951798566
-
Stronger difficulty notions for client puzzles and denial-of-service- resistant protocols
-
A. Kiayias, editor, volume 6558 of LNCS, Springer, URL
-
D. Stebila, L. Kuppusamy, J. Rangasamy, C. Boyd, and J. González Nieto. Stronger difficulty notions for client puzzles and denial-of-service- resistant protocols. In A. Kiayias, editor, Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference, volume 6558 of LNCS, pages 284-301. Springer, 2011. URL: http://eprint.iacr.org/2010/649.pdf.
-
(2011)
Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference
, pp. 284-301
-
-
Stebila, D.1
Kuppusamy, L.2
Rangasamy, J.3
Boyd, C.4
Nieto, J.G.5
-
25
-
-
70350639691
-
Towards denial of service resilient key agreement protocols
-
C. Boyd and J. González Nieto, editors, volume 5594 of LNCS, Springer
-
D. Stebila and B. Ustaoglu. Towards denial of service resilient key agreement protocols. In C. Boyd and J. González Nieto, editors, Proceedings of the 14th Australasian Conference on Information Security and Privacy (ACISP) 2009, volume 5594 of LNCS, pages 389-406. Springer, 2009.
-
(2009)
Proceedings of the 14th Australasian Conference on Information Security and Privacy (ACISP) 2009
, pp. 389-406
-
-
Stebila, D.1
Ustaoglu, B.2
-
26
-
-
38349080863
-
Toward non-parallelizable client puzzles
-
F. Bao, S. Ling, T. Okamoto, H. Wang, and C. Xing, editors, volume 4856 of LNCS, Springer
-
S. Tritilanunt, C. Boyd, E. Foo, and J. González Nieto. Toward non-parallelizable client puzzles. In F. Bao, S. Ling, T. Okamoto, H. Wang, and C. Xing, editors, Cryptology and Network Security (CANS) 2007, volume 4856 of LNCS, pages 247-264. Springer, 2007.
-
(2007)
Cryptology and Network Security (CANS) 2007
, pp. 247-264
-
-
Tritilanunt, S.1
Boyd, C.2
Foo, E.3
González Nieto, J.4
-
28
-
-
0019080452
-
A modification of the RSA public-key encryption procedure
-
H. Williams. A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory, 26(6):726-729, 1980. (Pubitemid 11460687)
-
(1980)
IEEE Transactions on Information Theory
, vol.IT-26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
-
30
-
-
84889498828
-
-
Zona Research. April, URL
-
Zona Research. The need for speed II. April, 2001. URL: http://www.keynote.com/downloads/ZonaNeedForSpeed.pdf.
-
(2001)
The Need for Speed II
-
-
|