An integrated approach to cryptographic mitigation of denial-of-service attacks
暂无分享,去创建一个
Colin Boyd | Juan Manuel González Nieto | Douglas Stebila | Jothi Rangasamy | D. Stebila | C. Boyd | J. G. Nieto | Jothi Rangasamy
[1] Jason Smith,et al. Modelling denial of service attacks on JFK with Meadows's cost-based framework , 2006, ACSW.
[2] Catherine A. Meadows,et al. A formal framework and evaluation method for network denial of service , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[3] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[4] William Allen Simpson,et al. Photuris: Session-Key Management Protocol , 1999, RFC.
[5] Charlie Kaufman,et al. Internet Key Exchange (IKEv2) Protocol , 2005, RFC.
[6] Adam Stubblefield,et al. Using Client Puzzles to Protect TLS , 2001, USENIX Security Symposium.
[7] Gene Tsudik,et al. Improving secure server performance by re-balancing SSL/TLS handshakes , 2006, ASIACCS '06.
[8] Qijun Gu,et al. Denial of Service Attacks , 2012 .
[9] Pekka Nikander,et al. Stateless connections , 1997, ICICS.
[10] Daniel J. Bernstein. Proving Tight Security for Rabin-Williams Signatures , 2008, EUROCRYPT.
[11] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[12] Dan S. Wallach,et al. Performance analysis of TLS Web servers , 2006, TOCS.
[13] Jason Smith,et al. Denial-of-service resistance in key establishment , 2007, Int. J. Wirel. Mob. Comput..
[14] Daniel J. Bernstein,et al. A Secure Public-Key Signature System With Extremely Fast Verification , 2000 .
[15] Colin Boyd,et al. Toward Non-parallelizable Client Puzzles , 2007, CANS.
[16] Wu-chi Feng,et al. Design and implementation of network puzzles , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[17] Abdulmotaleb El-Saddik,et al. Requirements for Client Puzzles to Defeat the Denial of Service and the Distributed Denial of Service Attacks , 2006, Int. Arab J. Inf. Technol..
[18] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[19] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[20] Ari Juels,et al. $evwu Dfw , 1998 .
[21] Bogdan Warinschi,et al. Security Notions and Generic Constructions for Client Puzzles , 2009, ASIACRYPT.
[22] Colin Boyd,et al. Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols , 2011, CT-RSA.
[23] Michael K. Reiter,et al. Defending against denial-of-service attacks with puzzle auctions , 2003, 2003 Symposium on Security and Privacy, 2003..
[24] Douglas Stebila,et al. Towards Denial-of-Service-Resilient Key Agreement Protocols , 2009, ACISP.
[25] Hugh C. Williams,et al. A modification of the RSA public-key encryption procedure (Corresp.) , 1980, IEEE Trans. Inf. Theory.
[26] Catherine A. Meadows,et al. A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..