Network security via private-key certificates
ACM SIGOPS Operating Systems Review
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Cryptography and secure channels
Distributed systems (2nd Ed.)
Toward a secure system engineering methodolgy
Proceedings of the 1998 workshop on New security paradigms
Query-flood DoS attacks in gnutella
Proceedings of the 9th ACM conference on Computer and communications security
Impeding attrition attacks in P2P systems
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Hot or not: revealing hidden services by their clock skew
Proceedings of the 13th ACM conference on Computer and communications security
Attrition defenses for a peer-to-peer digital preservation system
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
A holistic anonymity framework for web services
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Some improvements to the cost-based framework for analyzing denial of service attacks
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Collaborative behavior visualization and its detection by observing darknet traffic
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 0.00 |
The contractor uses the client, the network, and the server to give a service to the customer. We put it this way to emphasise that the denial of service against which we seek to protect is the denial of service to the customer, not to the client. The attack may indeed consist of disabling or destroying the client, just as it may consist of interfering with the network or with the server. This paper does not consider issues of responsibility.