{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:11:37Z","timestamp":1729631497763,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/hpcc-css-icess.2015.148","type":"proceedings-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T16:52:33Z","timestamp":1448902353000},"page":"1785-1790","source":"Crossref","is-referenced-by-count":2,"title":["Analysis and Comparison of the Network Security Protocol with DoS\/DDoS Attack Resistance Performance"],"prefix":"10.1109","author":[{"given":"Linzhi","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Chunxiang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiaofang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanghong","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Defending DDoS Attack using Stochastic Model based Puzzle Controller","author":"isaac","year":"2013","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6554845"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5121\/ijans.2012.2203"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414480"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/BF01581144"},{"key":"ref36","article-title":"Internet Denial of Service: Attack and Defense Mechanisms","author":"mirkovic","year":"2005","journal-title":"University of Pittsburgh"},{"key":"ref35","first-page":"126","article-title":"The History of the LL L-Algorithm: The LLL Algorithm","author":"smeets","year":"2009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2366293"},{"key":"ref10","first-page":"236","article-title":"Efficient cryptographic Scheme Provably as sceurity as subset sum","author":"impaglia","year":"1989","journal-title":"Springer Journal of Cryptology"},{"journal-title":"Denial-of-service attacks still a threat","year":"2004","author":"vijayan","key":"ref11"},{"article-title":"W. A. Experimental RFC 2522","year":"0","author":"karn","key":"ref12"},{"key":"ref13","first-page":"170","article-title":"DoS-resistant authentication with client puzzles","author":"aura","year":"2000","journal-title":"Cambridge Security Protocols Workshop 2000"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33383-5_3"},{"journal-title":"IKE\/ISAKMP Considered Harmful","year":"1999","author":"simpson","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35515-3_31"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3233\/JCS-2001-91-206","article-title":"A Cost-Based Framework for Analysis of DoS in Networks","volume":"9","author":"meadows","year":"2001","journal-title":"Journal of Computer Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_19"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586118"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30054-7_15"},{"key":"ref4","article-title":"Proofs of work and bread pudding protocols","author":"jakobsson","year":"1999","journal-title":"the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security (CMS 99)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.13"},{"key":"ref3","first-page":"940","article-title":"A High-performance and Low-cost VLSI Implementation of the SHA-1 Hash Function","volume":"28","author":"ye-hua","year":"2007","journal-title":"Journal of Chinese Computer Systems"},{"key":"ref6","article-title":"Dos-resistant authentication with client puzzles","author":"aura","year":"2000","journal-title":"proc 8th int workshop on security protocols"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1387"},{"key":"ref5","first-page":"170","article-title":"Resitant authentication with client puzzles","author":"aura","year":"2011","journal-title":"Security Protocol"},{"key":"ref8","first-page":"139","article-title":"Pricing via processing or combatting junk mail","author":"dwork","year":"1992","journal-title":"Proc of CRYPTO"},{"key":"ref7","first-page":"15","article-title":"Protection of Authenticted Key-Agreement Protocol against a Denial of sevice Attack","volume":"2","author":"matsuura","year":"1988","journal-title":"Cientifica"},{"key":"ref2","article-title":"Research on Protecting Authentication Protocols against Denial of Service Attack and Implementation of Security Solution to Improve the Protocols","author":"jianzhou","year":"2007","journal-title":"Nanjing Nanjing University of Aeronautics and Astronautics"},{"key":"ref9","first-page":"151","article-title":"Client puzzle:a cryptographic countermeasure against connection depletion attacks","author":"jules","year":"1999","journal-title":"PROC 1999 Network and Distributed system Security symposium NDSS"},{"key":"ref1","first-page":"151","article-title":"Brainard. Client puzzles: a cryptographic counter measure against connection deletion attacks","author":"juels","year":"1999","journal-title":"proceedings of the network and distributed security system(NDSS\/99) IEEE computer society"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_30"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1456508.1456518"},{"key":"ref21","first-page":"36","author":"martinovic","year":"2008","journal-title":"Wireless client puzzles in IEEE 802 11 networks security by wireless"},{"key":"ref24","article-title":"On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes","author":"tang","year":"2010","journal-title":"Centre for Telematics and Information Technology University of Twente"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13739-6_28"},{"key":"ref26","article-title":"Hello Flood Attack and its Countermeasures in Wireless Sensor Networks","author":"singh","year":"2010","journal-title":"International Journal of Computer Science Issues"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIS.2010.5689528"}],"event":{"name":"2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems","start":{"date-parts":[[2015,8,24]]},"location":"New York, NY","end":{"date-parts":[[2015,8,26]]}},"container-title":["2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7335977\/7336120\/07336430.pdf?arnumber=7336430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T22:52:25Z","timestamp":1567378345000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7336430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/hpcc-css-icess.2015.148","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}