D. B. Chapman, E. D. Zwicky, and D. Russell, Building Internet Firewalls, 1995.

C. J. Hernandez-castro and A. Ribagorda, Remotely Telling Humans and Computers Apart: An Unsolved Problem, Proc. iNetSec '10, IFIP Advances in Information and Communication Technology, pp.9-26, 2009.
DOI : 10.1016/j.cose.2009.06.006

C. Kerr, R. Phaal, and D. Probert, A Framework for Strategic Military Capabilities in Defense Transformation, International Command and Control Research and Technology Symposium, 2006.

B. News, Political Hacktivists Turn To Web Attacks http://news.bbc.co.uk/1/hi/technology/8506698.stm. This is an electronic document. Date of publication Date retrieved Date last modified, 2010.

C. Wu, C. A. Huang, and J. D. Irwin, Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to Against Denial Of Service Attacks and Protect User Privacy, Proc. SpringSim '07, pp.362-369, 2007.

L. Von-ahn, M. Blum, N. J. Hopper, and J. Langford, CAPTCHA: Using Hard AI Problems for Security, Advances in Cryptology -Eurocrypt '03, pp.294-311, 2003.
DOI : 10.1007/3-540-39200-9_18

R. Anderson and T. Moore, The Economics of Information Security, Science, vol.314, issue.5799, pp.610-613, 2006.
DOI : 10.1126/science.1130992

B. Barak, A. Herzberg, D. Naor, and E. Shai, The proactive security toolkit and applications, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.18-27, 1999.
DOI : 10.1145/319709.319713

M. Bellare and S. Miner, A Forward-Secure Digital Signature Scheme Advances in Cryptology -Crypto '99, LNCS, vol.1666, pp.431-448, 1999.

S. Bluetooth, Bluetooth Core Specifications v4.0, 2009.

S. Buchegger, J. Y. Le, and . Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp.403-410, 2002.
DOI : 10.1109/EMPDP.2002.994321

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. Cohen, Managing network security: Returning fire, Network Security, vol.1999, issue.2, pp.11-15, 1999.
DOI : 10.1016/S1353-4858(00)80025-2

Y. Dodis, M. K. Franklin, J. Katz, and M. Yung, Intrusion-Resilient Public-Key Encryption, Topics in Cryptology -CT-RSA '03, pp.19-32, 2003.
DOI : 10.1007/3-540-36563-X_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Y. Dodis, J. Katz, S. Xu, and M. Yung, Key-Insulated Public-Key Cryptosystems Advances in Cryptology -Eurocrypt '02 UPnP Security Ceremonies: De- sign Document, 15. C. Ellison, pp.65-82, 2002.
DOI : 10.1007/3-540-46035-7_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. Gengler, Strikeback, Computer Fraud & Security, vol.1999, issue.1, pp.8-9, 1999.
DOI : 10.1016/S1361-3723(00)86977-8

B. Johnson and A. Hirsch, Facebook Backtracks after Online Privacy Protest, Guardian.co.uk, 2009.

C. Karlof, J. D. Tygar, and D. Wagner, Conditioned-safe ceremonies and a user study of an application to web authentication, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009.
DOI : 10.1145/1572532.1572578

C. Karlof, J. D. Tygar, and D. Wagner, Conditioned-safe ceremonies and a user study of an application to web authentication, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009.
DOI : 10.1145/1572532.1572578

V. Jayawal, W. Yurcik, and D. Doss, Internet Hack Back: Counter Attacks as Self-Defense or Vigilantism?, Proc. ISTAS '02, 2002.

J. H. Matsuura, Digital Victim or Vigilante " : Legal and Ethical Limits to Online Self-Defense, Proc. Ethicomp '04, pp.629-634, 2004.

M. Naor, Verification of a Human in the Loop, or Identification via the Turing Test Available online at http://www.wisdom.weizmann.ac.il/?naor/PAPERS/human abs.html 23 Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication, Proc. ProvSec '07, pp.169-177, 1996.

B. Schneier, The psychology of security, Communications of the ACM, vol.50, issue.5, p.128, 2007.
DOI : 10.1145/1230819.1241693

B. Schneier, How the Human Brain Buys Security, IEEE Security & Privacy Magazine, vol.6, issue.4, p.80, 2008.
DOI : 10.1109/MSP.2008.85

S. Shin, K. Kobara, and H. Imai, Leakage-Resilient Authenticated Key Establishment Protocols, Advances in Cryptology -Asiacrypt '03, pp.155-172, 2003.
DOI : 10.1007/978-3-540-40061-5_10

S. Vaudenay, Secure Communications over Insecure Channels based on Short Authenticated Strings Advances in Cryptology -Crypto '05, LNCS, vol.3621, pp.309-326, 2005.

M. Walfish, H. Balakrishnan, D. Karger, and S. Shenker, DoS: Fighting Fire with Fire, Proc. HotNets '05, 2005.

M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker, DDoS defense by offense, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, pp.303-314, 2006.
DOI : 10.1145/1151659.1159948

D. J. Welch, N. Buchheit, and A. Ruocco, Discussion: strike back, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.47-52, 1999.
DOI : 10.1145/335169.335192

Y. Zhang, W. Lou, and Y. Fang, SIP: a Secure Incentive Protocol against Selfishness in Mobile Ad Hoc Networks, Proc. IEEE WCNC '04, pp.1679-1684, 2004.