2003
DOI: 10.1002/asi.10253
|View full text |Cite
|
Sign up to set email alerts
|

A public‐key based authentication and key establishment protocol coupled with a client puzzle

Abstract: Network Denial-of-Service (DoS) attacks, which exhaust server resources and network bandwidth, can cause the target servers to be unable to provide proper services to the legitimate users and in some cases render the target systems inoperable and/or the target networks inaccessible. DoS attacks have now become a serious and common security threat to the Internet community. Public Key Infrastructure (PKI) has long been incorporated in various authentication protocols to facilitate verifying the identities of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2007
2007
2011
2011

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…In other words, the functionalities are masked by puzzles, which need to be solved first before the prover can access the functionalities. Besides realizing various security functionalities, researchers have also applied computational puzzle schemes to mitigate a wide range of DoS attacks, such as fighting junk emails [13,12], protecting authentication protocols [2,23,29], protecting IP networks [10,14,16,20,33,34,35], protecting wireless networks [24,26], and preventing Sybil attacks [6]. With a computational puzzle scheme implemented, the server (playing the role of verifier) can mitigate an attack by asking every client (playing the role of prover) to solve a puzzle before allocating any required resource.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In other words, the functionalities are masked by puzzles, which need to be solved first before the prover can access the functionalities. Besides realizing various security functionalities, researchers have also applied computational puzzle schemes to mitigate a wide range of DoS attacks, such as fighting junk emails [13,12], protecting authentication protocols [2,23,29], protecting IP networks [10,14,16,20,33,34,35], protecting wireless networks [24,26], and preventing Sybil attacks [6]. With a computational puzzle scheme implemented, the server (playing the role of verifier) can mitigate an attack by asking every client (playing the role of prover) to solve a puzzle before allocating any required resource.…”
Section: Literature Reviewmentioning
confidence: 99%