Sciweavers

75 search results - page 11 / 15
» Defending Against Denial of Service Attacks Using Secure Nam...
Sort
View
LCN
2002
IEEE
14 years 8 days ago
Controlled Multicast Framework
The IP multicast has not been widely used by current internet service operators, and part of this relates to the nature of multicast, which is designed to allow any host to receiv...
Rami Lehtonen, Jarmo Harju
IJSN
2006
93views more  IJSN 2006»
13 years 7 months ago
Limiting DoS attacks during multihop data delivery in wireless sensor networks
: Denial of Service (DoS) attacks can be easily launched in Wireless Sensor Networks (WSNs). Due to their resource constraints, namely limited energy, memory and bandwidth, WSNs ar...
Jing Deng, Richard Han, Shivakant Mishra
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 7 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
ASIACRYPT
2009
Springer
14 years 1 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...
INFOCOM
2007
IEEE
14 years 1 months ago
A Proxy View of Quality of Domain Name Service
— The Domain Name System (DNS) provides a critical service for the Internet – mapping of user-friendly domain names to their respective IP addresses. Yet, there is no standard ...
Lihua Yuan, Krishna Kant, Prasant Mohapatra, Chen-...