1. Standard Bloom Filters 2. Compressed Bloom Filters 3. Counting Bloom Filters 4. Representation of a set of (key, f(key)) 5. Invertible Bloom Filters
Overview of Network Security Cryptographic hash functions User authentication SSL IPSec & IKE Distributed Denial of Service (DDoS) Firewall Reading List