{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:33:31Z","timestamp":1725485611202},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540423003"},{"type":"electronic","value":"9783540477198"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-47719-5_27","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T01:15:16Z","timestamp":1180746916000},"page":"334-343","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks"],"prefix":"10.1007","author":[{"given":"DongGook","family":"Park","sequence":"first","affiliation":[]},{"given":"JungJoon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,4]]},"reference":[{"key":"27_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Proc. Security Protocols Workshop 2000","author":"T. Aura","year":"2001","unstructured":"T. Aura, P. Nikander, J. Leiwo, \u201cDOS-resistant authentication with client puzzles\u201d, Proc. Security Protocols Workshop 2000, Lecture Notes in Computer Science, Cambridge, UK, April 2000, Springer-Verlag 2001."},{"key":"27_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/BFb0028465","volume-title":"International Conference on Information and Communications Security ICICS\u201997","author":"T. Aura","year":"1997","unstructured":"T. Aura and P. Nikander, \u201cStateless connections\u201d, International Conference on Information and Communications Security ICICS\u201997, Lecture Notes in Computer Science 1334, Springer-Verlag, 1997, pp. 87\u201397."},{"key":"27_CR3","unstructured":"TR-INS-001313, Generic Criteria for Version 0.1 Wireless Access Communications Systems (WACS), Bellcore, Revision 1, June 1994."},{"key":"27_CR4","unstructured":"CERT, \u201cAdvisory CA-96.21: TCP SYN Flooding and IP Spoofing Attacks\u201d, (Available from \n                  http:\/\/www.cert.org\/advisories\/index.html\n                  \n                )"},{"key":"27_CR5","series-title":"Lect Notes Comput Sci","first-page":"139","volume-title":"Advances in Cryptology-Proc. CRYPTO\u2019 98","author":"C. Dwork","year":"1992","unstructured":"C. Dwork and M. Naor, \u201cPricing via processing or combatting junk mail\u201d, In Advances in Cryptology-Proc. CRYPTO\u2019 98, volume 740 of LNCS, pages 139\u2013147, Santa Barbara, CA USA, August 1992. Springer-Verlag."},{"key":"27_CR6","unstructured":"Stephen Frede, \u201cAttack Scenarios\u201d, Security Systems & Technologies, September 1999,pp.4\u201311."},{"key":"27_CR7","unstructured":"JTC, Text Modification to JTC(AIR)\/94.02.07-119R6, September 15, 1994."},{"key":"27_CR8","unstructured":"A. Juels and J. Brainard, \u201cClient puzzles: A cryptographic counter-measure against connection depletion attacks\u201d, Proc. 1999 Network and Distributed System Security Symposium (NDSS), Internet Society, March 1999, pp. 151\u2013165."},{"key":"27_CR9","unstructured":"P. Janson, G. Tsudik, and M. Yung, \u201cScalability and flexibility in authentication services: The KryptoKnight approach\u201d, IEEE INFOCOM\u201997, Tokyo, April 1997."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"P. Karn and W. A. Simpson. Photuris: Session-key management protocol. RFC 2522, IETF Network Working Group, March 1999.","DOI":"10.17487\/rfc2522"},{"key":"27_CR11","unstructured":"H. Krawczyk, \u201cSKEME: A Versatile Secure Key Exchange Mechanism for Internet\u201d, Proc. of the Internet Society Symposium on Network and Distributed System Security, February 1996."},{"key":"27_CR12","unstructured":"S. St.Laurent, cookies, McGraw-Hill, 1998."},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"J. Leiwo, P. Nikander, T. Aura, \u201cTowards network denial of service resistant protocols\u201d, Proc. Sixteenth Annual Working Conference on Information Security (SEC2000), IFTP Series, Vol. 175, Beijing, China, August 2000, Kluwer Academic Publishers.","DOI":"10.1007\/978-0-387-35515-3_31"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"H. Orman. The oakley key determination protocol. RFC2412. The Internet Society, November 1998.","DOI":"10.17487\/rfc2412"},{"key":"27_CR15","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/322510.322530","volume":"2 3","author":"L. C. Paulson","year":"1999","unstructured":"L. C. Paulson, \u201cInductive Analysis of the Internet Protocol TLS\u201d, ACM Transactions on Computer and System Security 2 3, 1999, pp. 332\u2013351.","journal-title":"ACM Transactions on Computer and System Security"},{"key":"27_CR16","unstructured":"T. Dierks and C. Allen, The TLS Protocol, [RFC 22246], January 1999."},{"key":"27_CR17","unstructured":"V. M.-Schonberger, \u201cThe Internet and Privacy Legislation: cookies for a Treat?\u201d. Available from \n                  http:\/\/www.wvjot.wvu.edu\/wvjolt\/current\/issue1\/article"},{"key":"27_CR18","unstructured":"C. L. Schuba et al., \u201cAnalysis of a denial of service attack on TCP\u201d, Proc. 1997 IEEE Symposium on Security and Privacy, May 1997, IEEE Computer Society Press. pp. 208\u2013223."},{"key":"27_CR19","unstructured":"D. Wagner and B. Schneier, \u201cAnalysis of the SSL 3.0 Protocol\u201d, The Second USENTX Workshop on Electronic Commerce Proceedings, USENTX Press, November 1996, pp. 29\u201340."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47719-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:34:44Z","timestamp":1558258484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47719-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540423003","9783540477198"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-47719-5_27","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"4 July 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}