메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 78-92

Defending against denial-of-service attacks with puzzle auctions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER OPERATING SYSTEMS; LINUX; NETWORK SECURITY; TRANSMISSION CONTROL PROTOCOL;

EID: 84954449334     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2003.1199329     Document Type: Conference Paper
Times cited : (64)

References (23)
  • 2
    • 0037517134 scopus 로고    scopus 로고
    • Dos-resistant authentication with client puzzles
    • Proceedings of the Cambridge Security Protocols Worshop 2000. Springer-Verlag
    • T. Aura, P. Nikander, and J. Leiwo. Dos-resistant authentication with client puzzles. In Proceedings of the Cambridge Security Protocols Worshop 2000. LNCS, Springer-Verlag, 2000.
    • (2000) LNCS
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 5
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • (extended abstract). Proceedings of Advances in Cryptology - CRYPTO'00, Springer-Verlag
    • D. Boneh and M. Naor. Timed commitments (extended abstract). In Proceedings of Advances in Cryptology - CRYPTO'00, volume 1880 of Lecture Notes in Computer Science, pages 236-254. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 7
    • 4143130116 scopus 로고    scopus 로고
    • June 4
    • CERT. Denial of service attacks. In http://www.cert.org/tech-tips/denial-of-service.html, June 4 2001.
    • (2001) Denial of Service Attacks
  • 12
    • 84943235829 scopus 로고
    • Pricing via processing or combating junk mail
    • E. Brickell, editor, Proceedings of ADVANCES IN CRYPTOLOGY - CRYPTO 92, Springer-Verlag
    • C. Dwork and M. Naor. Pricing via processing or combating junk mail. In E. Brickell, editor, Proceedings of ADVANCES IN CRYPTOLOGY - CRYPTO 92, volume 1328 of Lecture Notes in Computer Science, pages 139-147. Springer-Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.1328 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 13
    • 3142747919 scopus 로고    scopus 로고
    • Auditable metering with lightweight security
    • R. Hirschfeld, editor, Proceedings of Financial Cryptography 97 (FC 97), Springer-Verlag
    • M. K. Franklin and D. Malkhi. Auditable metering with lightweight security. In R. Hirschfeld, editor, Proceedings of Financial Cryptography 97 (FC 97), Lecture Notes in Computer Science. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science
    • Franklin, M.K.1    Malkhi, D.2
  • 15
    • 0034229418 scopus 로고    scopus 로고
    • Defeating distributed denial of service attacks
    • July-August
    • X. Geng and A. Whinston. Defeating distributed denial of service attacks. IEEE IT Professional, 2(4):36-41, July-August 2000.
    • (2000) IEEE IT Professional , vol.2 , Issue.4 , pp. 36-41
    • Geng, X.1    Whinston, A.2
  • 18
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzle: A cryptographic defense against connection depletion attacks
    • S. Kent, editor
    • A. Juels and J. Brainard. Client puzzle: A cryptographic defense against connection depletion attacks. In S. Kent, editor, Proceedings of NDSS'99, pages 151-165, 1999.
    • (1999) Proceedings of NDSS'99 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 19
    • 3042859154 scopus 로고    scopus 로고
    • Resisting syn flood dos attacks with a syn cache
    • S. J. Leffler, editor, USENIX, February 11-14
    • J. Lemmon. Resisting syn flood dos attacks with a syn cache. In S. J. Leffler, editor, Proceedings of BSDCon 2002. USENIX, February 11-14, 2002.
    • (2002) Proceedings of BSDCon 2002
    • Lemmon, J.1
  • 21
    • 47649085814 scopus 로고    scopus 로고
    • Defensive programming: Using an annotation toolkit to build dos-resistant software
    • December
    • X. Qie, R. Pang, and L. Peterson. Defensive programming: Using an annotation toolkit to build dos-resistant software. In Proceedings of the 5th OSDI Symposium, December 2002.
    • (2002) Proceedings of the 5th OSDI Symposium
    • Qie, X.1    Pang, R.2    Peterson, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.