메뉴 건너뛰기




Volumn , Issue , 2011, Pages 165-169

Prevention of man-in-the-middle attacks using ID based signatures

Author keywords

[No Author keywords available]

Indexed keywords

COMPREHENSIVE METHOD; DENIAL OF SERVICE ATTACKS; ID BASED SIGNATURE; IDENTITY BASED CRYPTOGRAPHY; IP ADDRESSS; IP SPOOFING; MAN IN THE MIDDLE ATTACKS; SIGNATURE SCHEME;

EID: 80455131070     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNDC.2011.40     Document Type: Conference Paper
Times cited : (10)

References (10)
  • 1
    • 55849088770 scopus 로고    scopus 로고
    • A two-level source address spoofing prevention based on automatic signature and verification mechanism
    • Yan Shen, Jun Bi, Jianping Wu and Qiang Liu. A two-level source address spoofing prevention based on automatic signature and verification mechanism, IEEE ISCC, pages 392-397, 2008.
    • (2008) IEEE ISCC , pp. 392-397
    • Shen, Y.1    Bi, J.2    Wu, J.3    Liu, Q.4
  • 2
    • 25844486083 scopus 로고    scopus 로고
    • Spoofing prevention method
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • Anat Bremler-Barr and Hanoch Levy, Spoofing prevention method, IEEE INFOCOM, pages 536-547, 2005. (Pubitemid 41390849)
    • (2005) Proceedings - IEEE INFOCOM , vol.1 , pp. 536-547
    • Bremler-Barr, A.1    Levy, H.2
  • 3
    • 26844582131 scopus 로고    scopus 로고
    • Defending against spoofed DDoS attacks with path fingerprint
    • DOI 10.1016/j.cose.2005.03.005, PII S0167404805000465
    • Fu-Yuan Lee and Shiuh-Pyng Shieh. Defending against spoofed DDoS attacks with path fingerprint, Computers Security, pages 571-586, 2005. (Pubitemid 41455416)
    • (2005) Computers and Security , vol.24 , Issue.7 , pp. 571-586
    • Lee, F.-Y.1    Shieh, S.2
  • 4
    • 42049090373 scopus 로고    scopus 로고
    • Packet forwarding with source verification
    • Craig A. Shue, Minaxi Gupta, Matthew P. Davy. Packet forwarding with source verification, IEEE INFOCOM, pages 1567-1582, 2008.
    • (2008) IEEE INFOCOM , pp. 1567-1582
    • Shue, C.A.1    Gupta, M.2    Davy, M.P.3
  • 5
    • 39049160574 scopus 로고    scopus 로고
    • Constructing inter-domain packet filters to control IP spoofing based on BGP updates
    • Z. Duan, X. Yuan and J. Chandrashekar. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates, IEEE INFOCOM, 2006.
    • (2006) IEEE INFOCOM
    • Duan, Z.1    Yuan, X.2    Chandrashekar, J.3
  • 7
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based Cryptosystems and Signature Schemes. CRYPTO 1984 Advances in Crytology, pages 47-53, 1984.
    • (1984) CRYPTO 1984 Advances in Crytology , pp. 47-53
    • Shamir, A.1
  • 8
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin. Identity-based Encryption from the Weil Pairing. SIAM Journal of Computation, pages 586-615, 2003.
    • (2003) SIAM Journal of Computation , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 9
    • 77953491924 scopus 로고    scopus 로고
    • Efficient unidirectional proxy re-encryption
    • Report 2009/189
    • Jian Weng, Sherman S.M. Chow, Yanjiang Yang, and Robert H. Deng. Efficient Unidirectional Proxy Re-Encryption. Cryptology ePrint Archive, Report 2009/189 (2009) http://eprint.iacr.org/.
    • (2009) Cryptology EPrint Archive
    • Weng, J.1    Sherman, S.M.C.2    Yang, Y.3    Deng, R.H.4
  • 10
    • 70350641392 scopus 로고    scopus 로고
    • A schnorr- like lightweight identity-based signature scheme
    • David Galindo and Flavio D. Garcia. A Schnorr- Like Lightweight Identity-Based Signature Scheme, AFRICACRYPT, pages 135-148, 2009.
    • (2009) Africacrypt , pp. 135-148
    • Galindo, D.1    Garcia, F.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.