InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels.
Jiaqing DongKai WangYongqiang LyuLibo JiaoHao YinPublished in: ICA3PP (4) (2018)
Keyphrases
- security threats
- security mechanisms
- security problems
- security protocols
- cyber attacks
- security measures
- computer security
- security vulnerabilities
- java card
- security issues
- countermeasures
- denial of service attacks
- security breaches
- stream cipher
- information security
- chosen plaintext
- security risks
- access control
- malicious attacks
- security requirements
- security policies
- malicious users
- fault injection
- security flaws
- intrusion prevention
- insider attacks
- cryptographic protocols
- cryptographic algorithms
- unauthorized access
- information leakage
- secure routing
- intrusion detection and prevention
- biometric template
- intrusion detection
- network security
- transitive closure
- resource constrained
- hash functions
- identity theft
- attack detection
- computer networks
- key management
- cyber security
- attack scenarios
- buffer overflow
- block cipher
- sql injection