-
1
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on TCP," in Proceedings of the IEEE Symposium on Security and Privacy, May 1997, pp. 208-223.
-
Proceedings of the IEEE Symposium on Security and Privacy, May 1997
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
2
-
-
1642283261
-
-
Computer Science Department, University of California, Los Angeles, Tech. Rep. 020018
-
J. Mirkovic, J. Martin, and P. Reiher, "A taxonomy of DDoS attacks and DDoS defense mechanisms," Computer Science Department, University of California, Los Angeles, Tech. Rep. 020018, 2002.
-
(2002)
A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
4
-
-
0003515999
-
-
Department of Computer Science, Cornell University, Ithaca, NY USA, Tech. Rep.
-
L. Zhou, F. Schneider, and R. van Renesse, "COCA: A secure distributed on-line certification authority," Department of Computer Science, Cornell University, Ithaca, NY USA, Tech. Rep., 2000.
-
(2000)
COCA: A Secure Distributed On-line Certification Authority
-
-
Zhou, L.1
Schneider, F.2
Van Renesse, R.3
-
5
-
-
84899497048
-
Operating system support for network control: A virtual network interface approach for end-host OSs
-
T. Okumura, D. Mossé, M. Minami, and O. Nakamura, "Operating system support for network control: a virtual network interface approach for end-host OSs," in Proceedings of IWQoS, May 2002.
-
Proceedings of IWQoS, May 2002
-
-
Okumura, T.1
Mossé, D.2
Minami, M.3
Nakamura, O.4
-
7
-
-
67649650450
-
Analysis techniques for detecting coordinated attacks and probes
-
J. Green, D. Marchette, S. Northcutt, and B. Ralph, "Analysis techniques for detecting coordinated attacks and probes," in Proceedings of USENIX Workshop on Intrusion Detection and Network Monitoring, April 1999.
-
Proceedings of USENIX Workshop on Intrusion Detection and Network Monitoring, April 1999
-
-
Green, J.1
Marchette, D.2
Northcutt, S.3
Ralph, B.4
-
8
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
July
-
V. Paxson, "An analysis of using reflectors for distributed denial-of-service attacks," ACM Computer Communications Review (CCR), vol. 31, no. 3, July 2001.
-
(2001)
ACM Computer Communications Review (CCR)
, vol.31
, Issue.3
-
-
Paxson, V.1
-
12
-
-
0036375249
-
Migratory TCP: Connection migration for service continuity in the Internet
-
F. Sultan, K. Srinivasan, D. Iyer, and L. Iftode, "Migratory TCP: Connection migration for service continuity in the Internet," in Proceedings of The 22nd International Conference on Distributed Computing Systems (ICDCS), 2002.
-
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS), 2002
-
-
Sultan, F.1
Srinivasan, K.2
Iyer, D.3
Iftode, L.4
-
13
-
-
0028462933
-
Threshold cryptography
-
July-August
-
Y. Desmedt, "Threshold cryptography," in European Trans. on Telecommunications, vol. 5, no. 4, July-August 1994, pp. 449-457.
-
(1994)
European Trans. on Telecommunications
, vol.5
, Issue.4
, pp. 449-457
-
-
Desmedt, Y.1
-
14
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Proc. Crypto'95, vol. 5, no. 4. Springer Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive secret sharing or: How to cope with perpetual leakage," in LNCS 963, Proc. Crypto'95, vol. 5, no. 4. Springer Verlag, 1995, pp. 339-352.
-
(1995)
LNCS
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
16
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. W. andD. Cullar, and J. D. Tygar, "SPINS: Security protocols for sensor networks" in Proceedings of MOBICOM, 2001.
-
Proceedings of MOBICOM, 2001
-
-
Perrig, A.1
Szewczyk, R.2
W, V.3
Cullar, D.4
Tygar, J.D.5
-
18
-
-
0022793132
-
How to construct random functions
-
October
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," in Journal of the ACM, vol. 33, October 1986, pp. 792-807.
-
(1986)
Journal of the ACM
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
|