Efficient, DoS-resistant, secure key exchange for internet protocols
Proceedings of the 9th ACM conference on Computer and communications security
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
DOS-Resistant Authentication with Client Puzzles
Revised Papers from the 8th International Workshop on Security Protocols
A public-key based authentication and key establishment protocol coupled with a client puzzle
Journal of the American Society for Information Science and Technology
Just fast keying: Key agreement in a hostile internet
ACM Transactions on Information and System Security (TISSEC)
Analysis of the 802.11i 4-way handshake
Proceedings of the 3rd ACM workshop on Wireless security
The dual receiver cryptosystem and its applications
Proceedings of the 11th ACM conference on Computer and communications security
Enhanced of key agreement protocols resistant to a denial-of-service attack
Fundamenta Informaticae
Efficient authenticated key agreement protocols resistant to a denial-of-service attack
International Journal of Network Management
Modelling denial of service attacks on JFK with Meadows's cost-based framework
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Trickles: a stateless network stack for improved scalability, resilience, and flexibility
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Cost-based and time-based analysis of DoS-resistance in HIP
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
Denial-of-service resistance in key establishment
International Journal of Wireless and Mobile Computing
A stateless approach to connection-oriented protocols
ACM Transactions on Computer Systems (TOCS)
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
On the state of IP spoofing defense
ACM Transactions on Internet Technology (TOIT)
Towards Denial-of-Service-Resilient Key Agreement Protocols
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
International Journal of Information and Computer Security
A proposal for DoS-defensive internet key exchange
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
An integrated approach to cryptographic mitigation of denial-of-service attacks
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Examining the dos resistance of HIP
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Towards a provably secure dos-resilient key exchange protocol with perfect forward secrecy
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
BloomCasting: security in bloom filter based multicast
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Efficient modular exponentiation-based puzzles for denial-of-service protection
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack
Fundamenta Informaticae
Hi-index | 0.00 |