Login / Signup
An integrated approach to cryptographic mitigation of denial-of-service attacks.
Jothi Rangasamy
Douglas Stebila
Colin Boyd
Juanma González Nieto
Published in:
AsiaCCS (2011)
Keyphrases
</>
denial of service attacks
smart card
dos attacks
security threats
key management
intrusion detection system
risk management
ddos attacks
hash functions
end hosts
wireless networks
network security