نتایج جستجو برای: Dos Resistance

تعداد نتایج: 501953  

Journal: :IJWMC 2007
Jason Smith Suratose Tritilanunt Colin Boyd Juan Manuel González Nieto Ernest Foo

Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive cryptographic operations in order to authenticate the protocol initiator and to generate the cryptographic keying material that will subsequently be...

1999
Kanta Matsuura

|Key-agreement protocol will play an important role as an entrance to secure communication over the Internet. Speci cally, ISAKMP(Internet Security Association and Key Management Protocol)/Oakley key-agreement is currently a leading approach for communication between two parties. Basic idea of ISAKMP/Oakley is an authenticated Di eHellman (DH) key-agreement protocol. This authentication owes a ...

Journal: :Annales UMCS, Informatica 2012
Urszula Krawczyk Piotr Sapiecha

In this article the subject of DoS vulnerabilities of cryptographic key establishment and authentication protocols is discussed. The system for computer-aided DoS protocol resistance analysis, which employs the Petri nets formalism and Spin model-checker, is presented.

Journal: :The Journal of antibiotics 1980
T Fujiwara Y Takahashi K Matsumoto E Kondo

A new aminoglycoside antibiotic, S-11-A, was isolated from the fermentation broth of the 2-deoxystreptamine negative (DOS-) mutant of Bacillus circulans S-11. The structure of S-11-A was elucidated as 1-deamino-1-hydroxyxylostasin, which contains an intermediate of DOS biosynthesis (S-11-P) and has resistance to some aminoglycoside-inactivating enzymes. This is the first finding of antibiotic p...

2006
Suratose Tritilanunt Colin Boyd Ernest Foo Juan Manuel González Nieto

We examine DoS resistance of the Host Identity Protocol (HIP) and reveal a technique to deny legitimate services. To demonstrate the experiment, we implement a formal model of HIP based on Timed Petri Nets and use a simulation approach provided in CPN Tools to achieve a formal analysis. By integrating adjustable puzzle difficulty, HIP can mitigate the effect of DoS attacks. However, the inabili...

Journal: :IACR Cryptology ePrint Archive 2006
Kemal Bicakci Bruno Crispo Andrew S. Tanenbaum

Common occurrence of server overload and the threat of denial-of-service (DoS) attacks makes highly desirable to improve the performance and DoS resistance of SSL handshakes. In this paper, we tackle these two related problems by proposing reverse SSL, an extension in which the server is relieved from the heavy public key decryption operation and authenticated by means of a digital signature in...

Journal: :Computers & Security 2009
Stylianos Basagiannis Panagiotis Katsaros Andrew Pombortsis Nikolaos Alexiou

Secure authentication features of communication and electronic commerce protocols involve computationally expensive and memory intensive cryptographic operations that have the potential to be turned into denial-of-service (DoS) exploits. Recent proposals attempt to improve DoS resistance by implementing a trade-off between the resources required for the potential victim(s) with the resources us...

2000
Kanta Matsuura

The rst phase of Internet Key Exchange (IKE) is an authenticated version of Di e-Hellman (DH) key-agreement. Since the authentication is computationally expensive, computational burden caused by malicious requests may exhaust the CPU resource of the target. Attackers can also abuse inappropriate use of Cookies and exhaust the memory resource of the target. In search of resistance against these ...

2014
Maurice HT Ling

Testing evolutionary hypothesis in experimental setting is expensive, time consuming, and unlikely to recapitulate evolutionary history if evolution is repeated. Computer simulations of virtual organisms, also known as artificial life or digital organisms (DOs) can be used for in silico study of evolutionary processes. This mini-review focuses on the use of DOs in the study of genetic evolution...

Journal: :Journal of applied physiology 2015
Iris C Sanches Filipe F Conti Nathalia Bernardes Janaina de O Brito Elia G Galdini Cláudia R Cavaglieri Maria-Cláudia Irigoyen Kátia De Angelis

The purpose of this study was to compare the effects of aerobic, resistance, or combined exercise training on cardiovascular autonomic control and mortality in diabetic ovariectomized rats. Female Wistar rats were divided into one of five groups: euglycemic sedentary (ES), diabetic ovariectomized sedentary (DOS), diabetic ovariectomized aerobic-trained (DOTA), diabetic ovariectomized resistance...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید