{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:13:55Z","timestamp":1742379235070,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_12","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"80-96","source":"Crossref","is-referenced-by-count":6,"title":["Guaranteeing Access in Spite of Distributed Service-Flooding Attacks"],"prefix":"10.1007","author":[{"given":"Virgil D.","family":"Gligor","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656. Springer, Heidelberg (2003)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-44810-1_22","volume-title":"Security Protocols","author":"T. Aura","year":"2001","unstructured":"Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol.\u00a02133, pp. 170\u2013178. Springer, Heidelberg (2001)"},{"key":"12_CR3","volume-title":"Data Networks","author":"D. Bertsekas","year":"1992","unstructured":"Bertsekas, D., Gallager, R.: Data Networks, 2nd edn. Prentice-Hall, Englewood Cliffs (1992)","edition":"2"},{"key":"12_CR4","first-page":"22","volume-title":"Making the Commons Work: Theory, Practice and Policy","author":"D.W. Bromley","year":"1992","unstructured":"Bromley, D.W.: Making the Commons Work: Theory, Practice and Policy. ICS Press, San Francisco (1992), (Part 2, describing case studies; cf. [17], p. 22, 272"},{"key":"12_CR5","unstructured":"Darmohray, T., Oliver, R.: Hot Spares for DoS Attacks. login\u00a025, No.7, (July 2000)"},{"key":"12_CR6","unstructured":"Dean, D., Stubblefield, A.: Using Client Puzzles to Protect TLS. In: Proc. of the USENIX Security Symposium (August 2001)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology - CRYPTO 1992","author":"C. Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 139\u2013147. Springer, Heidelberg (1993)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Gligor, V.D.: A Note on the Denial-of-Service Problem. In: Proc. of the IEEE Symposium on Computer Security and Privacy, Oakland, California (April 1983); also in IEEE Transactions on Software Engineering, SE-10, No. 3 (May 1984)","DOI":"10.1109\/TSE.1984.5010241"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Gligor, V.D.: On Denial of Service in Computer Networks. In: Proc. of Int\u2019l Conference on Data Engineering, Los Angeles, California, Los Angeles, California, February 1986, pp. 608\u2013617 (1986)","DOI":"10.1109\/ICDE.1986.7266268"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-45473-X_8","volume-title":"Fast Software Encryption","author":"V.D. Gligor","year":"2002","unstructured":"Gligor, V.D., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 92\u2013108. Springer, Heidelberg (2002)"},{"key":"12_CR11","first-page":"305","volume-title":"Information Processing Letters","author":"T. Hagerup","year":"1989","unstructured":"Hagerup, T., Rub, C.: A Guided Tour of Chernoff Bounds. In: Information Processing Letters, 33th edn., pp. 305\u2013308. North-Holland, Amsterdam (1989-90)","edition":"33"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1126\/science.162.3859.1243","volume":"162","author":"G. Hardin","year":"1968","unstructured":"Hardin, G.: The Tragedy of Commons. Science\u00a0162, 1243 (1968)","journal-title":"Science"},{"key":"12_CR13","first-page":"8","volume-title":"Computer Architecture: A Quantitative Approach","author":"J. Henessy","year":"1990","unstructured":"Henessy, J., Patterson, D.: Computer Architecture: A Quantitative Approach, pp. 8\u20139. Morgan-Kaufmann, San Francisco (1990)"},{"key":"12_CR14","unstructured":"Ioannidis, J., Bellovin, S.: Implementing Pushback: Router-Based Defense Against DDoS Attacks. In: Proc. of Network and Distributed Systems Security Symposium, San Diego, California, February 2002, pp. 79\u201386. San Diego (2002)"},{"key":"12_CR15","unstructured":"Juels, A., Brainard, J.: Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks. In: Proc. of Network and Distributed Systems Symposium, San Diego, CA, February (1999)"},{"key":"12_CR16","unstructured":"Lampson, B.: Software Components: Only Giants Survive. In: Herbert, A., Sparck Jones, K. (eds.) Computer Systems: Papers for Roger Needham. Microsoft Research, February 2003, pp. 113\u2013120 (2003)"},{"key":"12_CR17","volume-title":"The Future of Ideas: The Fate of the Commons in a Connected World","author":"L. Lessig","year":"2001","unstructured":"Lessig, L.: The Future of Ideas: The Fate of the Commons in a Connected World. Random House, N.Y. (2001)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Millen, J.K.: A Resource Allocation Model for Denial of Service. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, CA, vol.\u00a02, pp. 89\u2013106 (1993), (also in the Journal of Computer Security)","DOI":"10.3233\/JCS-1993-22-303"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring Internet Denial of Service Activity. In: Proc. of 2001 USENIX Security Symposium, Washington D.C (August 2001)","DOI":"10.21236\/ADA400003"},{"key":"12_CR20","volume-title":"Trusted Computing Platforms \u2013 TCPA Technology in Context","author":"S. Pearson","year":"2003","unstructured":"Pearson, S., Balacheff, B., Chen, L.: Trusted Computing Platforms \u2013 TCPA Technology in Context. Prentice Hall PTR, Englewood Cliffs (2003)"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Saltzer, J.H., Reed, D.P., Clark, D.D.: End-to-End Arguments in System Design. ACM Transactions on Computer Systems\u00a02 (November 1984)","DOI":"10.1145\/357401.357402"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Wang, L., Pai, V., Petersen, L.: The Effectiveness of Request Redirection on CDN Robustness. In: Proc. of the 5th Symp. on OS Design and Implementation (OSDI), Boston, Mass (December 2002)","DOI":"10.1145\/1060289.1060321"},{"key":"12_CR23","unstructured":"Wang, X., Reiter, M.: Defending Against Denial-of-Service Attacks with Puzzle Auctions. In: Proc. of IEEE Symp. on Security and Privacy, Berkeley, CA (May 2003)"},{"key":"12_CR24","unstructured":"Xu, J., Lipton, R., Essa, I.: Hello, Are You Human, Technical Report, Georgia Institute of Technology (November 2000)"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Yu, C.-F., Gligor, V.D.: A Formal Specification and Verification Method for Preventing Denial of Service Attacks. In: Proc. of the IEEE Security and Privacy Symposium, Oakland, CA, April 1988, vol.\u00a0SE-16, pp. 187\u2013200 (1998); also in IEEE Transactions on Software Engineering, June 1990, pp. 581-592","DOI":"10.1109\/SECPRI.1988.8111"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T15:33:48Z","timestamp":1736004828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11542322_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}