메뉴 건너뛰기




Volumn 54, Issue , 2006, Pages 125-134

Modelling Denial of Service Attacks on JFK with Meadows's Cost-Based Framework

Author keywords

Cryptographic protocols; Denial of service; Security analysis methodologies

Indexed keywords

CLIENT PUZZLES; CRYPTOGRAPHIC PROTOCOLS; DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; IP ADDRESSS; KEY AGREEMENT PROTOCOL; MODELLING FRAMEWORK; SECURITY ANALYSIS;

EID: 84872811083     PISSN: 14451336     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Article
Times cited : (26)

References (23)
  • 12
    • 0004115841 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE)
    • RFC 2409, Internet Engineering Task Force
    • Harkins, D. & Carrel, D. (1998), The Internet Key Exchange (IKE), RFC 2409, Internet Engineering Task Force.
    • (1998)
    • Harkins, D.1    Carrel, D.2
  • 14
    • 0004601832 scopus 로고    scopus 로고
    • Photuris: Session-Key Management Protocol
    • IETF
    • Karn, P. R. & Simpson, W. A. (1999), Photuris: Session-Key Management Protocol, RFC 2522, IETF.
    • (1999) RFC 2522
    • Karn, P.R.1    Simpson, W.A.2
  • 16
    • 84958601057 scopus 로고    scopus 로고
    • of Lecture Notes in Computer Science
    • Lim, C. H. & Lee, P. J. (1997), A key recovery attack on discrete log-based schemes using a prime order subgroup., in 'Advances in Cryptology- CRYPTO '97', Vol. 1294 of Lecture Notes in Computer Science, Springer-Verlag, pp. 249 - 263.
    • (1997) Springer-Verlag , vol.1294 , pp. 249-263
    • Lim, C.H.1    Lee, P.J.2
  • 18
    • 0035075103 scopus 로고    scopus 로고
    • A Cost-Based Framework for Analysis of Denial of Service in Networks
    • Meadows, C. (2001), 'A Cost-Based Framework for Analysis of Denial of Service in Networks', Journal of Computer Security 9(1), 143 - 164.
    • (2001) Journal of Computer Security , vol.9 , Issue.1 , pp. 143-164
    • Meadows, C.1
  • 20
    • 0005974305 scopus 로고    scopus 로고
    • IKE/ISAKMP Considered Harmful
    • Simpson, W. A. (1999), 'IKE/ISAKMP Considered Harmful', USENIX;login 24(6).
    • (1999) USENIX;login , vol.24 , Issue.6
    • Simpson, W.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.