Login / Signup
Oblivious DDoS mitigation with locator/ID separation protocol.
Kazuya Okada
Hiroaki Hazeyama
Youki Kadobayashi
Published in:
CFI (2014)
Keyphrases
</>
denial of service attacks
ddos attacks
lightweight
risk management
cryptographic protocols
network protocols
application layer
private information retrieval
authentication protocol
communication protocol
dos attacks
data mining
metadata
multi party