-
2
-
-
85045893940
-
Moderately Hard, Memory-bound Functions
-
Internet Society
-
Abadi, M., Burrows, M., Manasse, M. & Wobber, T. (2003), Moderately Hard, Memory-bound Functions, in 'Proceedings of the 10th Annual Neywork and Distributed System Security Symposium', Internet Society.
-
(2003)
Proceedings of the 10th Annual Neywork and Distributed System Security Symposium
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
3
-
-
3142632089
-
Just fast keying: Key agreement in a hostile network
-
Aiello, W., Bellovin, S. M., Blaze, M., Canetti, R., Ioannidis, J., Keromytis, A. D. & Reingold, O. (2004), 'Just fast keying: Key agreement in a hostile network', ACM Transactions on Information and System Security 7(2), 242 - 273.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 242-273
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
4
-
-
0005966913
-
Stateless Connections, in ICICS 97
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Aura, T. & Nikander, P. (1997), Stateless Connections, in 'ICICS '97: Proceedings of the First International Conference on Information and Communication Security', Vol. 1334 of Lecture Notes in Computer Science, Springer-Verlag, pp. 87 - 97.
-
(1997)
Proceedings of the First International Conference on Information and Communication Security
, vol.1334
, pp. 87-97
-
-
Aura, T.1
Nikander, P.2
-
5
-
-
84949938425
-
DOSResistant Authentication with Client Puzzles
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Aura, T., Nikander, P. & Leiwo, J. (2001), DOSResistant Authentication with Client Puzzles, in 'Revised Papers from the 8th International Workshop on Security Protocols', Vol. 2133 of Lecture Notes in Computer Science, Springer-Verlag, pp. 170 - 177.
-
(2001)
Revised Papers from the 8th International Workshop on Security Protocols
, vol.2133
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
6
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, in EUROCRYPT 01
-
Springer-Verlag
-
Canetti, R. & Krawczyk, H. (2001), Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, in 'EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques', Lecture Notes in Computer Science Vol. 2045, Springer-Verlag, pp. 453 - 474.
-
(2001)
Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Lecture Notes in Computer Science
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
7
-
-
84872787264
-
-
IACR. URL
-
Castelluccia, C., Mykletun, E. & Tsudik, G. (2005), Improving Secure Server Performance by Rebalancing SSL/TLS Handshakes, Cryptology ePrint Archive 2005/037, IACR. URL: http://eprint.iacr.org/2005/037
-
(2005)
Improving Secure Server Performance by Rebalancing SSL/TLS Handshakes, Cryptology ePrint Archive 2005/037
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
10
-
-
25644445353
-
The Design and Implementation of Network Puzzles
-
IEEE. To Appear
-
Feng, W., Kaiser, E., Feng, W. & Luu, A. (2005), The Design and Implementation of Network Puzzles, in 'Proceedings of INFOCOM 2005', IEEE. To Appear.
-
(2005)
Proceedings of INFOCOM 2005
-
-
Feng, W.1
Kaiser, E.2
Feng, W.3
Luu, A.4
-
12
-
-
0004115841
-
The Internet Key Exchange (IKE)
-
RFC 2409, Internet Engineering Task Force
-
Harkins, D. & Carrel, D. (1998), The Internet Key Exchange (IKE), RFC 2409, Internet Engineering Task Force.
-
(1998)
-
-
Harkins, D.1
Carrel, D.2
-
14
-
-
0004601832
-
Photuris: Session-Key Management Protocol
-
IETF
-
Karn, P. R. & Simpson, W. A. (1999), Photuris: Session-Key Management Protocol, RFC 2522, IETF.
-
(1999)
RFC 2522
-
-
Karn, P.R.1
Simpson, W.A.2
-
16
-
-
84958601057
-
-
of Lecture Notes in Computer Science
-
Lim, C. H. & Lee, P. J. (1997), A key recovery attack on discrete log-based schemes using a prime order subgroup., in 'Advances in Cryptology- CRYPTO '97', Vol. 1294 of Lecture Notes in Computer Science, Springer-Verlag, pp. 249 - 263.
-
(1997)
Springer-Verlag
, vol.1294
, pp. 249-263
-
-
Lim, C.H.1
Lee, P.J.2
-
18
-
-
0035075103
-
A Cost-Based Framework for Analysis of Denial of Service in Networks
-
Meadows, C. (2001), 'A Cost-Based Framework for Analysis of Denial of Service in Networks', Journal of Computer Security 9(1), 143 - 164.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1
, pp. 143-164
-
-
Meadows, C.1
-
20
-
-
0005974305
-
IKE/ISAKMP Considered Harmful
-
Simpson, W. A. (1999), 'IKE/ISAKMP Considered Harmful', USENIX;login 24(6).
-
(1999)
USENIX;login
, vol.24
, Issue.6
-
-
Simpson, W.A.1
-
22
-
-
14844334596
-
Mitigating bandwidth-exhaustion attacks using congestion puzzles, in CCS 04
-
ACM Press, Washington DC, USA
-
Wang, X. & Reiter, M. K. (2004), Mitigating bandwidth-exhaustion attacks using congestion puzzles, in 'CCS '04: Proceedings of the 11th ACM conference on Computer and communications security', ACM Press, Washington DC, USA, pp. 257 - 267.
-
(2004)
Proceedings of the 11th ACM conference on Computer and communications security
, pp. 257-267
-
-
Wang, X.1
Reiter, M.K.2
-
23
-
-
14844300104
-
New Client Outsourcing Techniques for DoS Resistance, in CCS 04
-
ACM Press, Washington DC, USA
-
Waters, B., Juels, A., Halderman, J. A. & Felten, E. W. (2004), New Client Outsourcing Techniques for DoS Resistance, in 'CCS '04: Proceedings of the 11th ACM conference on Computer and communications security', ACM Press, Washington DC, USA, pp. 246 - 256.
-
(2004)
ceedings of the 11th ACM conference on Computer and communications security
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
|