multi6-1----Page:6
1
2
3
4
5
6
7
New DoS Opportunity on Identification
Depending on a way to identify a host, the host may be subject to DoS
PK cryptography is computationary expensive
Never perform PK computation (if any) without a cookie exchange
not a protection against MITM
PPT Version