Towards Denial-of-Service-Resilient Key Agreement Protocols
暂无分享,去创建一个
[1] Jason Smith,et al. Modelling denial of service attacks on JFK with Meadows's cost-based framework , 2006, ACSW.
[2] Catherine A. Meadows,et al. A formal framework and evaluation method for network denial of service , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[3] Ernest F. Brickell,et al. Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.
[4] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[5] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[6] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[7] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[8] Giuseppe Ateniese. Verifiable encryption of digital signatures and applications , 2004, TSEC.
[9] Charlie Kaufman,et al. Internet Key Exchange (IKEv2) Protocol , 2005, RFC.
[10] Paul Syverson,et al. Fail-Stop Protocols: An Approach to Designing Secure Protocols (Preprint) , 1995 .
[11] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[12] Hugo Krawczyk,et al. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.
[13] Ari Juels,et al. $evwu Dfw , 1998 .
[14] Brent Waters,et al. New client puzzle outsourcing techniques for DoS resistance , 2004, CCS '04.
[15] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[16] K. Paterson,et al. On The Plausible Deniability Feature of Internet Protocols , 2002 .
[17] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[18] Pekka Nikander,et al. Host Identity Protocol , 2005 .
[19] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[20] Bart Preneel. Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security , 1999 .
[21] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[22] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[23] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[24] Pekka Nikander,et al. Stateless connections , 1997, ICICS.
[25] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[26] William Allen Simpson,et al. Photuris: Session-Key Management Protocol , 1999, RFC.
[27] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[28] Berkant Ustaoglu,et al. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS , 2008, Des. Codes Cryptogr..
[29] Wesley M. Eddy,et al. TCP SYN Flooding Attacks and Common Mitigations , 2007, RFC.
[30] Michael K. Reiter,et al. Defending against denial-of-service attacks with puzzle auctions , 2003, 2003 Symposium on Security and Privacy, 2003..
[31] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[32] Ted Wobber,et al. Moderately hard, memory-bound functions , 2005, TOIT.
[33] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[34] Angelos D. Keromytis,et al. Just fast keying: Key agreement in a hostile internet , 2004, TSEC.
[35] Colin Boyd,et al. Protocols for Key Establishment and Authentication , 2003 .
[36] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[37] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[38] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.