Search from the table of contents of 2.5 million books
Advanced Search (Beta)

Information Security Technology for Applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers |
Springer Berlin Heidelberg
Information Security Technology for Applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers

Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions
Authors

ARI Id

1664901398655_3994399

Access

Not Available Free

Pages

136-154

DOI

10.1007/978-3-642-27937-9_10

Chapter URL

https://rd.springer.com/chapter/10.1007/978-3-642-27937-9_10

Loading...
Table of Contents of Book
Chapters/HeadingsAuthor(s)PagesInfo
Loading...
Chapters/HeadingsAuthor(s)PagesInfo
Similar Books
Loading...
Similar Chapters
Loading...
Similar Thesis
Loading...

Similar News

Loading...
Similar Articles
Loading...
Similar Article Headings
Loading...