Secure DNS from amplification attack by using modified bloom filters.
Uzma SattarTalha NaqashMuhammad Raheel ZafarKashif RazzaqFaisal bin UbaidPublished in: ICDIM (2013)
Keyphrases
- bloom filter
- key exchange protocol
- data structure
- record linkage
- security measures
- authentication protocol
- authentication mechanism
- block cipher
- key agreement
- authentication scheme
- data mining
- security management
- secret key
- security issues
- security policies
- load balancing
- information leakage
- management system
- membership queries
- key management
- security protocols
- countermeasures
- smart card
- lightweight
- data warehouse
- neural network