A security framework for protecting traffic between collaborative domains
暂无分享,去创建一个
[1] Stefan Mangard,et al. A new approach to DNS security (DNSSEC) , 2001, CCS '01.
[2] John Wu,et al. Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks , 2002 .
[3] T. Dierks,et al. The TLS protocol , 1999 .
[4] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[5] Scott Rose,et al. DNS Security Introduction and Requirements , 2005, RFC.
[6] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[7] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[8] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[9] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[10] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[11] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[12] Robert Stone,et al. CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.
[13] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[14] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[15] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.