ID-Based PPM for IP Traceback.
Yu-Kuo TsengYou-Yi LuJen-Yi HuangWen-Shyong HsiehBao Rong ChangYu-Chang ChenShi-Huang ChenPublished in: ICICIC (2) (2006)
Keyphrases
- partially blind signature scheme
- blind signature scheme
- blind signature
- ddos attacks
- public key
- ip networks
- ip address
- signature scheme
- data sets
- ring signature scheme
- bilinear pairings
- signcryption scheme
- encryption scheme
- genetic algorithm
- real time
- internet protocol
- diffie hellman
- ip addresses
- security protocols
- mobile ipv
- key management
- key agreement