{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:33:05Z","timestamp":1725514385889},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540721598"},{"type":"electronic","value":"9783540721635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72163-5_12","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T09:27:19Z","timestamp":1181035639000},"page":"129-144","source":"Crossref","is-referenced-by-count":2,"title":["An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols"],"prefix":"10.1007","author":[{"given":"Zhen","family":"Cao","sequence":"first","affiliation":[]},{"given":"Zhi","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jianbin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Liyong","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/JSAC.2002.806125","volume":"21","author":"C. Meadows","year":"2003","unstructured":"Meadows, C.: Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE Journal on Selected Areas in Communications\u00a021(1), 44\u201354 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Meadows, C.: A formal framework and evaluation method for network denial of service. In: Proceedings of The 12th Computer Security Foundations Workshop, pp. 4\u201313 (1999)","DOI":"10.1109\/CSFW.1999.779758"},{"issue":"1","key":"12_CR3","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3233\/JCS-2001-91-206","volume":"9","author":"C. Meadows","year":"2001","unstructured":"Meadows, C.: A cost-based framework for analysis of denial of service networks. Journal of Computer Security\u00a09(1), 143\u2013164 (2001)","journal-title":"Journal of Computer Security"},{"key":"12_CR4","volume-title":"Value-at-Risk Theory and Practice","author":"G.A. Holton","year":"2003","unstructured":"Holton, G.A.: Value-at-Risk Theory and Practice. Elsevier, Amsterdam (2003)"},{"key":"12_CR5","volume-title":"Against the gods: The remarkable story of risk","author":"P. Bernstein","year":"1996","unstructured":"Bernstein, P.: Against the gods: The remarkable story of risk. John Wiley and Sons, Chichester (1996)"},{"key":"12_CR6","unstructured":"Basel-Committee: Consultative document: The new basel capital accord (2001), http:\/\/www.bis.org\/publ\/bcbsca03.pdf"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/IPDPS.2004.1303319","volume-title":"Proceedings of the 18th International Parallel and Distributed Processing Symposium","author":"S. Kleban","year":"2004","unstructured":"Kleban, S., Clearwater, S.: Computation-at-risk: Assessing job portfolio management risk on clusters. In: Proceedings of the 18th International Parallel and Distributed Processing Symposium, pp. 254\u2013260. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"12_CR8","first-page":"347","volume-title":"Proceedings of the 18th IEEE International Conference on Cluster Computing","author":"S. Kleban","year":"2004","unstructured":"Kleban, S., Clearwater, S.: Computation-at-risk: Employing the grid for computational risk management. In: Proceedings of the 18th IEEE International Conference on Cluster Computing, pp. 347\u2013352. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"12_CR9","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/CSFW.1997.596779","volume-title":"Proceedings of 10th IEEE Computer Security Foundations Workshop","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: Casper: a compiler for the analysis of security protocols. In: Proceedings of 10th IEEE Computer Security Foundations Workshop, June 1997, pp. 18\u201330. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Millen, J.K.: Capsl: Common authentication protocol specification language. Technical Report MP 97B48, The MITRE Corporation (1997), http:\/\/www.csl.sri.com\/users\/millen\/capsl\/","DOI":"10.1145\/304851.304879"},{"key":"12_CR11","unstructured":"CCITT-Committee: Ccitt recommendation x.509: The directory authentication framework (1988), http:\/\/www.lsv.ens-cachan.fr\/spore\/ccittx509_3.html"},{"issue":"2","key":"12_CR12","first-page":"288","volume":"33","author":"J. Wei","year":"2005","unstructured":"Wei, J., et al.: A new countermeasure for protecting authentication protocols against denial of service attack. Acta Electronia Sinica\u00a033(2), 288\u2013293 (2005)","journal-title":"Acta Electronia Sinica"},{"key":"12_CR13","unstructured":"OpenSSL: The open source toolkit for ssl\/tls, http:\/\/www.openssl.org"},{"key":"12_CR14","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, Chichester (1996)","edition":"2"},{"issue":"8","key":"12_CR15","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1002\/dac.729","volume":"18","author":"M. Hamdi","year":"2005","unstructured":"Hamdi, M., Boudriga, N.: Computer and network security risk management: Theory, challenges, and countermeasures. International Journal of Communication Systems\u00a018(8), 763\u2013793 (2005)","journal-title":"International Journal of Communication Systems"},{"key":"12_CR16","volume-title":"Proceedings of the 2006 Quality of Protection Workshop","author":"J. Mirkovic","year":"2006","unstructured":"Mirkovic, J., et al.: Measuring denial of service. In: Proceedings of the 2006 Quality of Protection Workshop, ACM Press, New York (2006)"},{"key":"12_CR17","unstructured":"Mirkovic, J., Fahmy, S., Reiher, P.: Measuring impact of dos attacks. In: Proceedings of the DETER Community Workshop on Cyber Security Experimentation (June 2006)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-45600-7_37","volume-title":"Information and Communications Security","author":"Y. Chen","year":"2001","unstructured":"Chen, Y., et al.: Quantifying network denial of service: A location service case study. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, pp. 340\u2013351. Springer, Heidelberg (2001)"},{"key":"12_CR19","unstructured":"Smith, J., Gonzalez-Nieto, J.M., Boyd, C.: Modelling denial of service attacks on jfk with meadows\u2019s cost-based framework. In: Proceedings of the Fourth Australasian Information Security Workshop, Australian Computer Society, Inc. (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72163-5_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:29:16Z","timestamp":1605763756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72163-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540721598","9783540721635"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72163-5_12","relation":{},"subject":[]}}