multi6-1----Page:6
1  2  3  4  5  6  7 

New DoS Opportunity on Identification
Depending on a way to identify a host, the host may be subject to DoS
PK cryptography is computationary expensive
Never perform PK computation (if any) without a cookie exchange
not a protection against MITM
PPT Version