1 |
Kargl, F., J. Maier, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," in World Wide Web, pp. 252-262, 2011.
|
2 |
Shari, L., "A Framework for Security Requirements," Computer & Security, Vol.10, pp.511-523, 1991
|
3 |
Catherine, M., "A formal framework and evaluation method for network denial of service," In Proc. 12th IEEE Computer Security Foundations Workshop, pp.4-13, 2011.
|
4 |
Jhon, B., J. Ari, "Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks," Proceedings of the Network and Distributed Systems Security Symposium, Feb., 2012.
|
5 |
Boneh, D., M. Franklin, "Identity based encryption from the Weil paring," Advances in Cryptology: Crypto, pp.213-229, 2011.
|
6 |
Pasi, E., "Denial of Service in Public Key Protocols," Helsinki University of Technology 2010.
|
7 |
Tuomas, A., N. Pekka and L. Jussipekka, "DOS-resistant Authentication with Client Puzzles," Proceedings of the International Workshop on Security Protocols, April 2012.
|
8 |
Dean, D. and A. Stubblefield, "Using Client Puzzles to Protect TLS," in 10th Annual USENIX Security Symposium, 2010.
|
9 |
Young-Soo, Kim, Heung-Sik Choi,"Security Model and Application of Persistent Object using Type Information in Integrated Environment of Distributed System," The Korea Institute of Martime Information & Communication & Sciences, vol.4, no.1, pp661-669. June. 2004.
|
10 |
Krawcyzk, H., "The Order of Encryption and Authentication for Protecting Communications," In Proc. Crypto '01, 2010.
|