A Novel Proof of Work Model Based on Pattern Matching to Prevent DoS Attack
暂无分享,去创建一个
Hamid Mousavi | Mohammad Reza Abbasy | Bharanidharan Shanmugam | Mohammad Reza Najaf Torkaman | Ali Ordi | Ali Ordi | M. Abbasy | H. Mousavi | Bharanidharan Shanmugam
[1] Wu-chi Feng,et al. Design and implementation of network puzzles , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[2] John C. Mitchell,et al. Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.
[3] Byoung Uk Kim,et al. Performance analysis Toolset for wireless intrusion detection systems , 2010, 2010 International Conference on High Performance Computing & Simulation.
[4] Matthew S. Gast,et al. 802.11 Wireless Networks: The Definitive Guide , 2002 .
[5] Srinivas Sampalli,et al. Client-based intrusion prevention system for 802.11 wireless LANs , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[6] T.N. Nguyen,et al. A lightweight solution for Wireless LAN: Letter-envelop protocol , 2008, 2008 Third International Conference on Communications and Networking in China.
[7] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[8] Shi Ting,et al. Design and analysis of a wireless authentication protocol against DoS attacks based on Hash function , 2006 .
[9] Udo W. Pooch,et al. A secure dynamic cryptographic and encryption protocol for wireless networks , 2009, IEEE EUROCON 2009.
[10] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[11] Bülent Tavli,et al. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.
[12] A. Celik,et al. Improving the security of wireless LANs by managing 802.1x disassociation , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..
[13] Taieb Znati,et al. A Guided Tour Puzzle for Denial of Service Prevention , 2009, 2009 Annual Computer Security Applications Conference.
[14] Zhang Laishun,et al. A Client Puzzle Based Defense Mechanism to Resist DoS Attacks in WLAN , 2010, 2010 International Forum on Information Technology and Applications.
[15] Lin Gao,et al. A new client-puzzle based DoS-resistant scheme of IEEE 802.11i wireless authentication protocol , 2010, 2010 3rd International Conference on Biomedical Engineering and Informatics.
[16] Seungjoo Kim,et al. Information Security and Cryptology - ICISC 2005 , 2005, Lecture Notes in Computer Science.
[17] Neeraj Mittal,et al. A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.
[18] Chung-Hsin Liu,et al. The Analysis for DoS and DDoS Attacks of WLAN , 2010, 2010 Second International Conference on Multimedia and Information Technology.
[19] Matthew S Gast. 802.11 Wireless Networks: The Definitive Guide, Second Edition , 2005 .
[20] Jacques Patarin,et al. Benes and Butterfly Schemes Revisited , 2005, ICISC.
[21] Heba Kamal Aslan,et al. WiMax Security , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).