Building Internet Firewalls, 1995. ,
Remotely Telling Humans and Computers Apart: An Unsolved Problem, Proc. iNetSec '10, IFIP Advances in Information and Communication Technology, pp.9-26, 2009. ,
DOI : 10.1016/j.cose.2009.06.006
A Framework for Strategic Military Capabilities in Defense Transformation, International Command and Control Research and Technology Symposium, 2006. ,
Political Hacktivists Turn To Web Attacks http://news.bbc.co.uk/1/hi/technology/8506698.stm. This is an electronic document. Date of publication Date retrieved Date last modified, 2010. ,
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to Against Denial Of Service Attacks and Protect User Privacy, Proc. SpringSim '07, pp.362-369, 2007. ,
CAPTCHA: Using Hard AI Problems for Security, Advances in Cryptology -Eurocrypt '03, pp.294-311, 2003. ,
DOI : 10.1007/3-540-39200-9_18
The Economics of Information Security, Science, vol.314, issue.5799, pp.610-613, 2006. ,
DOI : 10.1126/science.1130992
The proactive security toolkit and applications, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.18-27, 1999. ,
DOI : 10.1145/319709.319713
A Forward-Secure Digital Signature Scheme Advances in Cryptology -Crypto '99, LNCS, vol.1666, pp.431-448, 1999. ,
Bluetooth Core Specifications v4.0, 2009. ,
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp.403-410, 2002. ,
DOI : 10.1109/EMPDP.2002.994321
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.8825
Managing network security: Returning fire, Network Security, vol.1999, issue.2, pp.11-15, 1999. ,
DOI : 10.1016/S1353-4858(00)80025-2
Intrusion-Resilient Public-Key Encryption, Topics in Cryptology -CT-RSA '03, pp.19-32, 2003. ,
DOI : 10.1007/3-540-36563-X_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.2665
Key-Insulated Public-Key Cryptosystems Advances in Cryptology -Eurocrypt '02 UPnP Security Ceremonies: De- sign Document, 15. C. Ellison, pp.65-82, 2002. ,
DOI : 10.1007/3-540-46035-7_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.9601
Strikeback, Computer Fraud & Security, vol.1999, issue.1, pp.8-9, 1999. ,
DOI : 10.1016/S1361-3723(00)86977-8
Facebook Backtracks after Online Privacy Protest, Guardian.co.uk, 2009. ,
Conditioned-safe ceremonies and a user study of an application to web authentication, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009. ,
DOI : 10.1145/1572532.1572578
Conditioned-safe ceremonies and a user study of an application to web authentication, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009. ,
DOI : 10.1145/1572532.1572578
Internet Hack Back: Counter Attacks as Self-Defense or Vigilantism?, Proc. ISTAS '02, 2002. ,
Digital Victim or Vigilante " : Legal and Ethical Limits to Online Self-Defense, Proc. Ethicomp '04, pp.629-634, 2004. ,
Verification of a Human in the Loop, or Identification via the Turing Test Available online at http://www.wisdom.weizmann.ac.il/?naor/PAPERS/human abs.html 23 Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication, Proc. ProvSec '07, pp.169-177, 1996. ,
The psychology of security, Communications of the ACM, vol.50, issue.5, p.128, 2007. ,
DOI : 10.1145/1230819.1241693
How the Human Brain Buys Security, IEEE Security & Privacy Magazine, vol.6, issue.4, p.80, 2008. ,
DOI : 10.1109/MSP.2008.85
Leakage-Resilient Authenticated Key Establishment Protocols, Advances in Cryptology -Asiacrypt '03, pp.155-172, 2003. ,
DOI : 10.1007/978-3-540-40061-5_10
Secure Communications over Insecure Channels based on Short Authenticated Strings Advances in Cryptology -Crypto '05, LNCS, vol.3621, pp.309-326, 2005. ,
DoS: Fighting Fire with Fire, Proc. HotNets '05, 2005. ,
DDoS defense by offense, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, pp.303-314, 2006. ,
DOI : 10.1145/1151659.1159948
Discussion: strike back, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.47-52, 1999. ,
DOI : 10.1145/335169.335192
SIP: a Secure Incentive Protocol against Selfishness in Mobile Ad Hoc Networks, Proc. IEEE WCNC '04, pp.1679-1684, 2004. ,