Engaging Edge Networks in Preventing and Mitigating Undesirable Network Traffic

  • Authors:
  • Lan Wang;Qishi Wu;Dung Dinh Luong

  • Affiliations:
  • Department of Computer Science, University of Memphis, lanwang@memphis.edu;Department of Computer Science, University of Memphis, qishiwu@memphis.edu;Department of Computer Science, University of Memphis, dluong@memphis.edu

  • Venue:
  • NPSEC '07 Proceedings of the 2007 3rd IEEE Workshop on Secure Network Protocols
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash ...