You are here

Bibliography

Export 7 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is denial-of-service  [Clear All Filters]
2009
Tran A, Hopper NJ, Kim Y. Hashing it out in public: Common failure modes of DHT-based anonymity schemes. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655188.1655199
Evans NS, Dingledine R, Grothoff C. A Practical Congestion Attack on Tor Using Long Paths. In: 18th USENIX Security Symposium. 18th USENIX Security Symposium. USENIX; 2009. pp. 33–50. Available from: http://grothoff.org/christian/tor.pdf
2007
Borisov N, Danezis G, Mittal P, Tabriz P. Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity. In: Proceedings of CCS 2007. Proceedings of CCS 2007. ACM New York, NY, USA; 2007. Available from: http://portal.acm.org/citation.cfm?id=1315258
Evans NS, GauthierDickey C, Grothoff C. Routing in the Dark: Pitch Black. In: 23rd Annual Computer Security Applications Conference (ACSAC 2007). 23rd Annual Computer Security Applications Conference (ACSAC 2007). IEEE Computer Society; 2007. pp. 305–314. Available from: http://grothoff.org/christian/pitchblack.pdf
2002
Zhou L, Schneider FB, Renesse RV. COCA: A secure distributed online certification authority. ACM Trans. Comput. Syst. [Internet]. 2002 ;20:329–368. Available from: http://portal.acm.org/citation.cfm?id=571638#
Daswani N, Garcia-Molina H. Query-flood DoS attacks in gnutella. In: CCS '02: Proceedings of the 9th ACM conference on Computer and communications security. CCS '02: Proceedings of the 9th ACM conference on Computer and communications security. New York, NY, USA: ACM; 2002. pp. 181–192. Available from: http://portal.acm.org/citation.cfm?id=586110.586136#