An algebraic approach to IP traceback
暂无分享,去创建一个
Jerry R. Hobbs | Matthew K. Franklin | Sheila A. McIlraith | David L. Martin | Adam Stubblefield | Drew Dean | D. McDermott | M. Paolucci | M. Burstein | T. Payne | K. Sycara | S. Narayanan | M. Franklin | Drew Dean | A. Stubblefield | O. Lassila | Drew Dean | Matthew K. Franklin | Adam Stubblefield
[1] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[2] Elwyn R. Berlekamp,et al. Algebraic coding theory , 1984, McGraw-Hill series in systems science.
[3] David J. Goodman,et al. Personal Communications , 1994, Mobile Communications.
[4] Amin Shokrollahi,et al. A displacement approach to efficient decoding of algebraic-geometric codes , 1999, STOC '99.
[5] Madhu Sudan,et al. Algorithmic Issues in Coding Theory , 1997, FSTTCS.
[6] Donald E. Knuth,et al. The art of computer programming, volume 3: (2nd ed.) sorting and searching , 1998 .
[7] Ion Stoica,et al. Providing guaranteed services without per flow management , 1999, SIGCOMM '99.
[8] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[9] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[10] James A. Anderson,et al. Number Theory with Applications , 1996 .
[11] Phong Q. Nguyen,et al. Noisy Polynomial Interpolation and Noisy Chinese Remaindering , 2000, EUROCRYPT.
[12] William H. Press,et al. Numerical recipes in C. The art of scientific computing , 1987 .
[13] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[14] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[15] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[16] Madhu Sudan,et al. Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..
[17] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[18] K. K. Ramakrishnan,et al. A Proposal to add Explicit Congestion Notification (ECN) to IP , 1999, RFC.
[19] David Thomas,et al. The Art in Computer Programming , 2001 .
[20] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[21] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[22] William H. Press,et al. Numerical Recipes in FORTRAN - The Art of Scientific Computing, 2nd Edition , 1987 .
[23] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[24] Philip N. Klein,et al. Using router stamping to identify the source of IP packets , 2000, CCS.
[25] Donald E. Knuth,et al. The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .
[26] David L. Black,et al. Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers , 1998, RFC.
[27] Philip Almquist,et al. Type of Service in the Internet Protocol Suite , 1992, RFC.
[28] ZhangHui,et al. Providing guaranteed services without per flow management , 1999 .
[29] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[30] Ronitt Rubinfeld,et al. Reconstructing algebraic functions from mixed data , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.
[31] William H. Press,et al. Book-Review - Numerical Recipes in Pascal - the Art of Scientific Computing , 1989 .