×
15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers. Conference proceedings; © 2012.
In this paper, we study the security of multicast built on Bloom filter based forwarding and propose a technique called BloomCasting, which enables controlled ...
£44.99
The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The ...
... Espoo, Finland, October 27-29, 2010, Revised Selected Papers /. This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic ...
Information Security Technology for Applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers

Information Security Technology for Applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers

Book
This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010.The 13 full papers and 3 short papers presented... Google Books
Originally published: 24 January 2012
This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto ...
Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised ...
... Espoo, Finland, October 27-29, 2010, Revised Selected Papers /. This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic ...
Information Security Technology for Applications, 15th Nordic Conference on Secure IT Systems, NordSec ... Finland, October 27-29, 2010, Revised Selected Papers.
Missing: Espoo, | Show results with:Espoo,
A$84.99
... 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers. Information Security Technology for Applications: 15th Nordic Conference on Secure IT ...
27 Oct 2010 · In this paper, we present a general host identity-based technique for mitigating unsolicited traffic across different domains. We propose to ...