Author of the publication

A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks.

, , and . SAINT, page 261-264. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single-Path Authenticated-Encryption Scheme Based on Universal Hashing., and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 94-109. Springer, (2002)Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection., and . Information Hiding, volume 1174 of Lecture Notes in Computer Science, page 257-264. Springer, (1996)Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 916-925. Springer, (2005)A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks., and . ISC, volume 2433 of Lecture Notes in Computer Science, page 389-401. Springer, (2002)Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars., and . ISC, volume 2433 of Lecture Notes in Computer Science, page 484-500. Springer, (2002)A Key Escrow System with Protecting User's Privacy by Blind Decoding., , , and . ISW, volume 1396 of Lecture Notes in Computer Science, page 147-157. Springer, (1997)Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols., , and . STACS, volume 1373 of Lecture Notes in Computer Science, page 511-521. Springer, (1998)Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks., , and . INTRUST, volume 7222 of Lecture Notes in Computer Science, page 239-257. Springer, (2011)Design and Implementation of Document Access Control Model Based on Role and Security Policy., , , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 26-36. Springer, (2010)One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange., , and . Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, page 87-96. Springer, (2006)