1 |
Tuomas, A., N. Pekka and L. Jussipekka,'DOS-resistant Authentication with ClientPuzzles,' Proceedings of the InternationalWorkshop on Security Protocols, April 2000
|
2 |
Dean, D. and A. Stubblefield, 'Using ClientPuzzles to Protect TLS,' in lOth AnnualUSENIX Security Symposium, 2001
|
3 |
Boneh, D,, M. Franklin, 'Identity basedencryption from the Weil paring,' Advancesin Cryptology: Crypto, pp.213-229, 2001
|
4 |
김영수, 최홍식 '통합분산환경에서 타입정보를이용한 지속성객체의 보안 모델 및 응용' 한국해양정보통신학회지, 제8권 제3호, pp661-669, 2004
|
5 |
Shari, L., 'A Framework for SecurityRequirements,' Computer & Security, Vol.10,pp.511-523, 1991
|
6 |
김영수, '메시지보안시스템의 인증 프로토콜설계 및 검증,' 박사학위논문, 국민대학교대학원, 2003
|
7 |
Krawcyzk, H., 'The Order of Encryptionand Authentication for ProtectingCommunications,' In Proc. Crypto '01, 2001
|
8 |
Kargl, F., J. Maier, and M. Weber,'Protecting Web Servers from DistributedDenial of Service Attacks.' in World WideWeb, pp. 252-262, 2002
|
9 |
Pasi, E., 'Denial of Service in Public KeyProtocols,' Helsinki University of Technology 2001
|
10 |
Catherine, M., 'A formal framework andevaluation method for network denial ofservice,' In Proc. 12th IEEE ComputerSecurity Foundations Workshop, pp.4-13,1999
|
11 |
Jhon, B., J. Ari, 'Client Puzzles: ACryptographic Countermeasure AgainstConnection Depletion Attacks,' Proceedingsof the Network and Distributed SystemsSecurity Symposium, Feb., 1999
|