-
1
-
-
0025603636
-
A policy model for denial of service
-
Franconia, NH USA, June, IEEE Computer Society Press
-
Edward Amoroso. A policy model for denial of service. In Proc. Computer Security Foundations Workshop III, pages 110–114, Franconia, NH USA, June 1990. IEEE Computer Society Press.
-
(1990)
In Proc. Computer Security Foundations Workshop III
, pp. 110-114
-
-
Amoroso, E.1
-
2
-
-
0005966913
-
Stateless connections
-
LNCS, Beijing, China, November, Springer Verlag
-
Tuomas Aura and Pekka Nikander. Stateless connections. In Proc. International Conference on Information and Communications Security (ICICS’97), volume 1334 of LNCS, pages 87–97, Beijing, China, November 1997. Springer Verlag.
-
(1997)
In Proc. International Conference on Information and Communications Security (ICICS’97)
, vol.1334
, pp. 87-97
-
-
Aura, T.1
Nikander, P.2
-
3
-
-
84949940702
-
-
CERT, November
-
TCP SYN flooding and IP spoofing attack. CERT Advisory CA-96.21, CERT, November 1996.
-
(1996)
CERT Advisory CA-96.21
-
-
-
4
-
-
0022093904
-
Cunningham. Optimal attack and reinforcement of a network
-
July
-
William H. Cunningham. Optimal attack and reinforcement of a network. Journal of the ACM, 32(3):549–561, July 1985.
-
(1985)
Journal of the ACM
, vol.32
, Issue.3
, pp. 549-561
-
-
William, H.1
-
5
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
LNCS, Santa Barbara, CA USA, August, Springer-Verlag
-
Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In Advances in Cryptology - Proc. CRYPTO’98, volume 740 of LNCS, pages 139–147, Santa Barbara, CA USA, August 1992. Springer-Verlag.
-
(1992)
. In Advances In Cryptology - Proc. CRYPTO’98
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
6
-
-
0020915186
-
A note on the denial-of-service problem
-
Oakland, CA USA, April, IEEE Computer Society
-
Virgil D. Gligor. A note on the denial-of-service problem. In Proc. 1983 IEEE Symposium on Research in Security and Privacy, pages 139–149, Oakland, CA USA, April 1983. IEEE Computer Society.
-
(1983)
In Proc. 1983 IEEE Symposium on Research in Security and Privacy
, pp. 139-149
-
-
Gligor, V.D.1
-
9
-
-
0031361979
-
Scalability and flexibility in authentication services: The KryptoKnight approach
-
Tokyo, April
-
P. Janson, G. Tsudik, and M. Yung. Scalability and flexibility in authentication services: The KryptoKnight approach. In IEEE INFOCOM’97, Tokyo, April 1997.
-
IEEE INFOCOM’97
, pp. 1997
-
-
Janson, P.1
Tsudik, G.2
Yung, M.3
-
10
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
San Diego, CA, February, Internet Society
-
Ari Juels and John Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proc. 1999 Network and Distributed Systems Security Symposium (NDSS), pages 151–165, San Diego, CA, February 1999. Internet Society.
-
(1999)
In Proc. 1999 Network and Distributed Systems Security Symposium (NDSS)
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
12
-
-
0032664157
-
A formal framework and evaluation method for network denial of service
-
Mordano, Italy, June, IEEE Computer Society
-
Catherine Meadows. A formal framework and evaluation method for network denial of service. In Proc. 12th IEEE Computer Security Foundations Workshop, pages 4–13, Mordano, Italy, June 1999. IEEE Computer Society.
-
(1999)
In Proc. 12Th IEEE Computer Security Foundations Workshop
, pp. 4-13
-
-
Meadows, C.1
-
13
-
-
0026850008
-
A resource allocation model for denial of service
-
Oakland, CA USA, May, IEEE Computer Society Press
-
Jonathan K. Millen. A resource allocation model for denial of service. In Proc. 1992 IEEE Computer Society Symposium on Security and Privacy, pages 137–147, Oakland, CA USA, May 1992. IEEE Computer Society Press.
-
(1992)
In Proc. 1992 IEEE Computer Society Symposium on Security and Privacy
, pp. 137-147
-
-
Millen, J.K.1
-
15
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
Oakland, CA USA, May, IEEE Computer Society Press
-
Christoph L. Schuba, Ivan V. Krsul, Markus G. Kuhn, Eugene H. Spaffold, Aurobindo Sundaram, and Diego Zamboni. Analysis of a denial of service attack on TCP. In Proc. 1997 IEEE Symposium on Security and Privacy, pages 208–223, Oakland, CA USA, May 1997. IEEE Computer Society Press.
-
(1997)
In Proc. 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spaffold, E.H.4
Sundaram, A.5
Zamboni, D.6
-
17
-
-
0023829320
-
A formal specification and verification method for the prevention of denial of service
-
Oakland, CA USA, April, IEEE Computer Society Press
-
Che-Fn Yu and Virgil D. Gligor. A formal specification and verification method for the prevention of denial of service. In Proc. 1988 IEEE Symposium on Security and Privacy, pages 187–202, Oakland, CA USA, April 1988. IEEE Computer Society Press.
-
(1988)
In Proc. 1988 IEEE Symposium on Security and Privacy
, pp. 187-202
-
-
Che-Fn, Y.1
Gligor, V.D.2
|