Mitigation of unsolicited traffic across domains with host identities and puzzles
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Adoption barriers of network layer protocols: The case of host identity protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.01 |
HIPL gives your Linux box a name.