A formal framework and evaluation method for network denial of service
- 20 January 2003
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 18 references indexed in Scilit:
- A resource allocation model for denial of servicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Some new attacks upon security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- What do we mean by entity authentication?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Strand spaces: why is a security protocol correct?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Casper: a compiler for the analysis of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- Denial of Service: A PerspectivePublished by Springer Nature ,1995
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- Password authentication with insecure communicationCommunications of the ACM, 1981
- Time, clocks, and the ordering of events in a distributed systemCommunications of the ACM, 1978