FastPass: Providing First-Packet Delivery
暂无分享,去创建一个
[1] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[2] Xiaowei Yang,et al. A DoS-limiting network architecture , 2005, SIGCOMM '05.
[3] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[4] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OPSR.
[5] David Wetherall,et al. Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..
[6] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues , 2000, NDSS.
[7] M. McLoone,et al. Fast Montgomery modular multiplication and RSA cryptographic processor architectures , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[8] George Varghese,et al. Automatically inferring patterns of resource consumption in network traffic , 2003, SIGCOMM '03.
[9] Argyraki,et al. Network Capabilities : The Good , the Bad and the Ugly Katerina , 2022 .
[10] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[11] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[12] Dawn Xiaodong Song,et al. SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[13] David Mazières,et al. Separating key management from file system security , 1999, SOSP.
[14] David R. Cheriton,et al. Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks , 2003, ArXiv.
[15] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[16] Yakov Rekhter,et al. Mpls: Technology and Applications , 2000 .
[17] John Black,et al. Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV , 2002, CRYPTO.
[18] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[19] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[20] Eddie Kohler,et al. The Click modular router , 1999, SOSP.
[21] Ingrid Verbauwhede,et al. Minimum area cost for a 30 to 70 Gbits/s AES processor , 2004, IEEE Computer Society Annual Symposium on VLSI.
[22] Steven M. Bellovin,et al. Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.
[23] Daniel J. Bernstein,et al. A Secure Public-Key Signature System With Extremely Fast Verification , 2000 .
[24] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[25] Michael Walfish,et al. DoS: Fighting fire with fire , 2005 .
[26] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[27] Wu-chi Feng,et al. Design and implementation of network puzzles , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[28] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[29] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..