Prevention of Man-in-the-Middle Attacks Using ID Based Signatures
暂无分享,去创建一个
[1] Bernd Freisleben,et al. TrueIP: prevention of IP spoofing attacks using identity-based cryptography , 2009, SIN '09.
[2] Anat Bremler-Barr,et al. Spoofing prevention method , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] Flavio D. Garcia,et al. A Schnorr-Like Lightweight Identity-Based Signature Scheme , 2009, AFRICACRYPT.
[5] Shiuh-Pyng Shieh,et al. Defending against spoofed DDoS attacks with path fingerprint , 2005, Comput. Secur..
[6] A. Shamm. Identity-based cryptosystems and signature schemes , 1985 .
[7] Qiang Liu,et al. A two-level source address spoofing prevention based on automatic signature and verification mechanism , 2008, 2008 IEEE Symposium on Computers and Communications.
[8] Robert H. Deng,et al. Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.
[9] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[10] Craig A. Shue,et al. Packet forwarding with source verification , 2008, Comput. Networks.