Cryptographic Approaches to Denial-of-Service Resistance View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2011-09-06

AUTHORS

C. Boyd , J. Gonzalez-Nieto , L. Kuppusamy , H. Narasimhan , C. Pandu Rangan , J. Rangasamy , J. Smith , D. Stebila , V. Varadarajan

ABSTRACT

Authentication is a promising way to treat denial-of-service (DoS) threats against nonpublic services because it allows servers to restrict connections only to authorised users. However, there is a catch with this argument since authentication itself is typically a computationally intensive rocess that is necessarily exposed to unauthenticated entities. This means that the authentication protocol can become a source of denial-of-service vulnerability itself, thereby causing the same problem it is aimed at solving. More... »

PAGES

183-238

References to SciGraph publications

  • 2007. Stronger Security of Authenticated Key Exchange in PROVABLE SECURITY
  • 2001-07-13. Entity Authentication and Key Distribution in ADVANCES IN CRYPTOLOGY — CRYPTO’ 93
  • 2008-03. Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2003. A General Attack Model on Hash-Based Client Puzzles in CRYPTOGRAPHY AND CODING
  • 2011. Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols in TOPICS IN CRYPTOLOGY – CT-RSA 2011
  • 2000. Towards Network Denial of Service Resistant Protocols in INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES
  • 2009-07. A game-theoretic analysis of denial of service attacks in wireless random access in WIRELESS NETWORKS
  • Book

    TITLE

    An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks

    ISBN

    978-81-322-0276-9
    978-81-322-0277-6

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-81-322-0277-6_6

    DOI

    http://dx.doi.org/10.1007/978-81-322-0277-6_6

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1033911358


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Queensland University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.1024.7", 
              "name": [
                "Information Security Institute, Queensland University of Technology, Brisbane, Australia"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Boyd", 
            "givenName": "C.", 
            "id": "sg:person.015654656435.49", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015654656435.49"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Queensland University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.1024.7", 
              "name": [
                "Information Security Institute, Queensland University of Technology, Brisbane, Australia"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Gonzalez-Nieto", 
            "givenName": "J.", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Queensland University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.1024.7", 
              "name": [
                "Information Security Institute, Queensland University of Technology, Brisbane, Australia"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kuppusamy", 
            "givenName": "L.", 
            "id": "sg:person.011361640302.55", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011361640302.55"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Anna University, Chennai", 
              "id": "https://www.grid.ac/institutes/grid.252262.3", 
              "name": [
                "Department of Computer Science and Engineering, College of Engineering Guindy, Anna University, Chennai, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Narasimhan", 
            "givenName": "H.", 
            "id": "sg:person.014127105371.95", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014127105371.95"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Indian Institute of Technology Madras", 
              "id": "https://www.grid.ac/institutes/grid.417969.4", 
              "name": [
                "Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Rangan", 
            "givenName": "C. Pandu", 
            "id": "sg:person.016366027737.61", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Queensland University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.1024.7", 
              "name": [
                "Information Security Institute, Queensland University of Technology, Brisbane, Australia"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Rangasamy", 
            "givenName": "J.", 
            "id": "sg:person.010554372373.40", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010554372373.40"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Queensland University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.1024.7", 
              "name": [
                "Information Security Institute, Queensland University of Technology, Brisbane, Australia"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Smith", 
            "givenName": "J.", 
            "id": "sg:person.016257374772.30", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016257374772.30"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Queensland University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.1024.7", 
              "name": [
                "Information Security Institute, Queensland University of Technology, Brisbane, Australia"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Stebila", 
            "givenName": "D.", 
            "id": "sg:person.014007215772.86", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014007215772.86"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Anna University, Chennai", 
              "id": "https://www.grid.ac/institutes/grid.252262.3", 
              "name": [
                "Department of Computer Science and Engineering, College of Engineering Guindy, Anna University, Chennai, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Varadarajan", 
            "givenName": "V.", 
            "id": "sg:person.011744235275.68", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011744235275.68"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/s11276-007-0088-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004584847", 
              "https://doi.org/10.1007/s11276-007-0088-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-40974-8_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011522502", 
              "https://doi.org/10.1007/978-3-540-40974-8_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-40974-8_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011522502", 
              "https://doi.org/10.1007/978-3-540-40974-8_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/359340.359342", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013337011"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3233/jcs-2001-91-206", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017095281"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/997150.997156", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020238858"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48329-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027269192", 
              "https://doi.org/10.1007/3-540-48329-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48329-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027269192", 
              "https://doi.org/10.1007/3-540-48329-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1456508.1456518", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029192549"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1006/jcss.1999.1694", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030084096"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/168588.168596", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032246154"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75670-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041988575", 
              "https://doi.org/10.1007/978-3-540-75670-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75670-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041988575", 
              "https://doi.org/10.1007/978-3-540-75670-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1128817.1128826", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044359693"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1030083.1030117", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045575351"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/996943.996946", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049767035"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-0-387-35515-3_31", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050636700", 
              "https://doi.org/10.1007/978-0-387-35515-3_31"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-007-9159-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052246950", 
              "https://doi.org/10.1007/s10623-007-9159-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-007-9159-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052246950", 
              "https://doi.org/10.1007/s10623-007-9159-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19074-2_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052924239", 
              "https://doi.org/10.1007/978-3-642-19074-2_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19074-2_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052924239", 
              "https://doi.org/10.1007/978-3-642-19074-2_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.2307/1911307", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1069639499"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csfw.2005.18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093411414"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csfw.2005.18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093411414"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csfw.1999.779758", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094496805"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2011-09-06", 
        "datePublishedReg": "2011-09-06", 
        "description": "Authentication is a promising way to treat denial-of-service (DoS) threats against nonpublic services because it allows servers to restrict connections only to authorised users. However, there is a catch with this argument since authentication itself is typically a computationally intensive rocess that is necessarily exposed to unauthenticated entities. This means that the authentication protocol can become a source of denial-of-service vulnerability itself, thereby causing the same problem it is aimed at solving.", 
        "editor": [
          {
            "familyName": "Raghavan", 
            "givenName": "S.V.", 
            "type": "Person"
          }, 
          {
            "familyName": "Dawson", 
            "givenName": "E", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-81-322-0277-6_6", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-81-322-0276-9", 
            "978-81-322-0277-6"
          ], 
          "name": "An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks", 
          "type": "Book"
        }, 
        "name": "Cryptographic Approaches to Denial-of-Service Resistance", 
        "pagination": "183-238", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1033911358"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-81-322-0277-6_6"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "a18b314dbc9c098e6933b2c4eae8a7da99e461ff477dafa216ee89eccc00c3bf"
            ]
          }
        ], 
        "publisher": {
          "location": "India", 
          "name": "Springer India", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-81-322-0277-6_6", 
          "https://app.dimensions.ai/details/publication/pub.1033911358"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T09:37", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000373_0000000373/records_13102_00000001.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-81-322-0277-6_6"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0277-6_6'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0277-6_6'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0277-6_6'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0277-6_6'


     

    This table displays all metadata directly associated to this object as RDF triples.

    195 TRIPLES      23 PREDICATES      45 URIs      19 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-81-322-0277-6_6 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N64678a59cfca4f15bdf3810a022547e3
    4 schema:citation sg:pub.10.1007/3-540-48329-2_21
    5 sg:pub.10.1007/978-0-387-35515-3_31
    6 sg:pub.10.1007/978-3-540-40974-8_26
    7 sg:pub.10.1007/978-3-540-75670-5_1
    8 sg:pub.10.1007/978-3-642-19074-2_19
    9 sg:pub.10.1007/s10623-007-9159-1
    10 sg:pub.10.1007/s11276-007-0088-8
    11 https://doi.org/10.1006/jcss.1999.1694
    12 https://doi.org/10.1109/csfw.1999.779758
    13 https://doi.org/10.1109/csfw.2005.18
    14 https://doi.org/10.1145/1030083.1030117
    15 https://doi.org/10.1145/1128817.1128826
    16 https://doi.org/10.1145/1456508.1456518
    17 https://doi.org/10.1145/168588.168596
    18 https://doi.org/10.1145/359340.359342
    19 https://doi.org/10.1145/996943.996946
    20 https://doi.org/10.1145/997150.997156
    21 https://doi.org/10.2307/1911307
    22 https://doi.org/10.3233/jcs-2001-91-206
    23 schema:datePublished 2011-09-06
    24 schema:datePublishedReg 2011-09-06
    25 schema:description Authentication is a promising way to treat denial-of-service (DoS) threats against nonpublic services because it allows servers to restrict connections only to authorised users. However, there is a catch with this argument since authentication itself is typically a computationally intensive rocess that is necessarily exposed to unauthenticated entities. This means that the authentication protocol can become a source of denial-of-service vulnerability itself, thereby causing the same problem it is aimed at solving.
    26 schema:editor N7ad63339ce3e4c7581d1b1ae14e68057
    27 schema:genre chapter
    28 schema:inLanguage en
    29 schema:isAccessibleForFree false
    30 schema:isPartOf Ndc35e7a88ff84ed1be9c90c4db777637
    31 schema:name Cryptographic Approaches to Denial-of-Service Resistance
    32 schema:pagination 183-238
    33 schema:productId N2c295eb680964873be14c81b9892e0ea
    34 N52acd6fb26274b419af1b0091db442f6
    35 Nf765369b24de47a78492cf1699116ba6
    36 schema:publisher Nb43798a175b74c149beaef1f6acad83d
    37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033911358
    38 https://doi.org/10.1007/978-81-322-0277-6_6
    39 schema:sdDatePublished 2019-04-16T09:37
    40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    41 schema:sdPublisher Nc26b2100bcd045779727c43a2de131f0
    42 schema:url https://link.springer.com/10.1007%2F978-81-322-0277-6_6
    43 sgo:license sg:explorer/license/
    44 sgo:sdDataset chapters
    45 rdf:type schema:Chapter
    46 N06aa7bf3661346ae8789680da32c770c rdf:first sg:person.014127105371.95
    47 rdf:rest N9d1e52d3ae374a82ab24de2978b7c2a3
    48 N0b1389988a344888bf651f8941725698 rdf:first sg:person.014007215772.86
    49 rdf:rest Nb609bbf402d64b7f831e7051801a33a0
    50 N19b8843e4b484028bef02f984aedd960 rdf:first sg:person.011361640302.55
    51 rdf:rest N06aa7bf3661346ae8789680da32c770c
    52 N2c295eb680964873be14c81b9892e0ea schema:name readcube_id
    53 schema:value a18b314dbc9c098e6933b2c4eae8a7da99e461ff477dafa216ee89eccc00c3bf
    54 rdf:type schema:PropertyValue
    55 N52acd6fb26274b419af1b0091db442f6 schema:name dimensions_id
    56 schema:value pub.1033911358
    57 rdf:type schema:PropertyValue
    58 N64678a59cfca4f15bdf3810a022547e3 rdf:first sg:person.015654656435.49
    59 rdf:rest N8b16f7b8413744c1be07ed827b65694a
    60 N7ad63339ce3e4c7581d1b1ae14e68057 rdf:first Nd962155e6225427ba8429a412d14387a
    61 rdf:rest Nc72813be393e44aab13df47516b006d6
    62 N888e111974f5470e906f993fbca1b484 schema:familyName Dawson
    63 schema:givenName E
    64 rdf:type schema:Person
    65 N88c5557c35074d40a1b0ecfb88c784d9 rdf:first sg:person.016257374772.30
    66 rdf:rest N0b1389988a344888bf651f8941725698
    67 N8b16f7b8413744c1be07ed827b65694a rdf:first N917aad8cda4d41b3aea9172c5f5de915
    68 rdf:rest N19b8843e4b484028bef02f984aedd960
    69 N917aad8cda4d41b3aea9172c5f5de915 schema:affiliation https://www.grid.ac/institutes/grid.1024.7
    70 schema:familyName Gonzalez-Nieto
    71 schema:givenName J.
    72 rdf:type schema:Person
    73 N9d1e52d3ae374a82ab24de2978b7c2a3 rdf:first sg:person.016366027737.61
    74 rdf:rest Nf0931e846f24450ab1113852a0ef7636
    75 Nb43798a175b74c149beaef1f6acad83d schema:location India
    76 schema:name Springer India
    77 rdf:type schema:Organisation
    78 Nb609bbf402d64b7f831e7051801a33a0 rdf:first sg:person.011744235275.68
    79 rdf:rest rdf:nil
    80 Nc26b2100bcd045779727c43a2de131f0 schema:name Springer Nature - SN SciGraph project
    81 rdf:type schema:Organization
    82 Nc72813be393e44aab13df47516b006d6 rdf:first N888e111974f5470e906f993fbca1b484
    83 rdf:rest rdf:nil
    84 Nd962155e6225427ba8429a412d14387a schema:familyName Raghavan
    85 schema:givenName S.V.
    86 rdf:type schema:Person
    87 Ndc35e7a88ff84ed1be9c90c4db777637 schema:isbn 978-81-322-0276-9
    88 978-81-322-0277-6
    89 schema:name An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks
    90 rdf:type schema:Book
    91 Nf0931e846f24450ab1113852a0ef7636 rdf:first sg:person.010554372373.40
    92 rdf:rest N88c5557c35074d40a1b0ecfb88c784d9
    93 Nf765369b24de47a78492cf1699116ba6 schema:name doi
    94 schema:value 10.1007/978-81-322-0277-6_6
    95 rdf:type schema:PropertyValue
    96 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    97 schema:name Information and Computing Sciences
    98 rdf:type schema:DefinedTerm
    99 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    100 schema:name Data Format
    101 rdf:type schema:DefinedTerm
    102 sg:person.010554372373.40 schema:affiliation https://www.grid.ac/institutes/grid.1024.7
    103 schema:familyName Rangasamy
    104 schema:givenName J.
    105 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010554372373.40
    106 rdf:type schema:Person
    107 sg:person.011361640302.55 schema:affiliation https://www.grid.ac/institutes/grid.1024.7
    108 schema:familyName Kuppusamy
    109 schema:givenName L.
    110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011361640302.55
    111 rdf:type schema:Person
    112 sg:person.011744235275.68 schema:affiliation https://www.grid.ac/institutes/grid.252262.3
    113 schema:familyName Varadarajan
    114 schema:givenName V.
    115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011744235275.68
    116 rdf:type schema:Person
    117 sg:person.014007215772.86 schema:affiliation https://www.grid.ac/institutes/grid.1024.7
    118 schema:familyName Stebila
    119 schema:givenName D.
    120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014007215772.86
    121 rdf:type schema:Person
    122 sg:person.014127105371.95 schema:affiliation https://www.grid.ac/institutes/grid.252262.3
    123 schema:familyName Narasimhan
    124 schema:givenName H.
    125 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014127105371.95
    126 rdf:type schema:Person
    127 sg:person.015654656435.49 schema:affiliation https://www.grid.ac/institutes/grid.1024.7
    128 schema:familyName Boyd
    129 schema:givenName C.
    130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015654656435.49
    131 rdf:type schema:Person
    132 sg:person.016257374772.30 schema:affiliation https://www.grid.ac/institutes/grid.1024.7
    133 schema:familyName Smith
    134 schema:givenName J.
    135 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016257374772.30
    136 rdf:type schema:Person
    137 sg:person.016366027737.61 schema:affiliation https://www.grid.ac/institutes/grid.417969.4
    138 schema:familyName Rangan
    139 schema:givenName C. Pandu
    140 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61
    141 rdf:type schema:Person
    142 sg:pub.10.1007/3-540-48329-2_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027269192
    143 https://doi.org/10.1007/3-540-48329-2_21
    144 rdf:type schema:CreativeWork
    145 sg:pub.10.1007/978-0-387-35515-3_31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050636700
    146 https://doi.org/10.1007/978-0-387-35515-3_31
    147 rdf:type schema:CreativeWork
    148 sg:pub.10.1007/978-3-540-40974-8_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011522502
    149 https://doi.org/10.1007/978-3-540-40974-8_26
    150 rdf:type schema:CreativeWork
    151 sg:pub.10.1007/978-3-540-75670-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041988575
    152 https://doi.org/10.1007/978-3-540-75670-5_1
    153 rdf:type schema:CreativeWork
    154 sg:pub.10.1007/978-3-642-19074-2_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052924239
    155 https://doi.org/10.1007/978-3-642-19074-2_19
    156 rdf:type schema:CreativeWork
    157 sg:pub.10.1007/s10623-007-9159-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052246950
    158 https://doi.org/10.1007/s10623-007-9159-1
    159 rdf:type schema:CreativeWork
    160 sg:pub.10.1007/s11276-007-0088-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004584847
    161 https://doi.org/10.1007/s11276-007-0088-8
    162 rdf:type schema:CreativeWork
    163 https://doi.org/10.1006/jcss.1999.1694 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030084096
    164 rdf:type schema:CreativeWork
    165 https://doi.org/10.1109/csfw.1999.779758 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094496805
    166 rdf:type schema:CreativeWork
    167 https://doi.org/10.1109/csfw.2005.18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093411414
    168 rdf:type schema:CreativeWork
    169 https://doi.org/10.1145/1030083.1030117 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045575351
    170 rdf:type schema:CreativeWork
    171 https://doi.org/10.1145/1128817.1128826 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044359693
    172 rdf:type schema:CreativeWork
    173 https://doi.org/10.1145/1456508.1456518 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029192549
    174 rdf:type schema:CreativeWork
    175 https://doi.org/10.1145/168588.168596 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032246154
    176 rdf:type schema:CreativeWork
    177 https://doi.org/10.1145/359340.359342 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013337011
    178 rdf:type schema:CreativeWork
    179 https://doi.org/10.1145/996943.996946 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049767035
    180 rdf:type schema:CreativeWork
    181 https://doi.org/10.1145/997150.997156 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020238858
    182 rdf:type schema:CreativeWork
    183 https://doi.org/10.2307/1911307 schema:sameAs https://app.dimensions.ai/details/publication/pub.1069639499
    184 rdf:type schema:CreativeWork
    185 https://doi.org/10.3233/jcs-2001-91-206 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017095281
    186 rdf:type schema:CreativeWork
    187 https://www.grid.ac/institutes/grid.1024.7 schema:alternateName Queensland University of Technology
    188 schema:name Information Security Institute, Queensland University of Technology, Brisbane, Australia
    189 rdf:type schema:Organization
    190 https://www.grid.ac/institutes/grid.252262.3 schema:alternateName Anna University, Chennai
    191 schema:name Department of Computer Science and Engineering, College of Engineering Guindy, Anna University, Chennai, India
    192 rdf:type schema:Organization
    193 https://www.grid.ac/institutes/grid.417969.4 schema:alternateName Indian Institute of Technology Madras
    194 schema:name Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India
    195 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...