DOS-Resistant Authentication with Client Puzzles
- 20 September 2001
- book chapter
- Published by Springer Nature
- p. 170-177
- https://doi.org/10.1007/3-540-44810-1_22
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- A formal framework and evaluation method for network denial of servicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A formal specification and verification method for the prevention of denial of servicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A resource allocation model for denial of servicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A policy model for denial of servicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service AttackPublished by Springer Nature ,1999
- Analysis of a denial of service attack on TCPPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1997
- Stateless connectionsPublished by Springer Nature ,1997
- TCP SYN flooding and IP spoofing attacksNetwork Security, 1996
- The network inhibition problemPublished by Association for Computing Machinery (ACM) ,1993
- Optimal attack and reinforcement of a networkJournal of the ACM, 1985