|
|
|
|
LEADER |
01794nmm a2200277 u 4500 |
001 |
EB001085933 |
003 |
EBX01000000000000000845297 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
151215 ||| eng |
020 |
|
|
|a 9781493934416
|
100 |
1 |
|
|a Wang, Xinyuan
|
245 |
0 |
0 |
|a Traceback and Anonymity
|h Elektronische Ressource
|c by Xinyuan Wang, Douglas Reeves
|
250 |
|
|
|a 1st ed. 2015
|
260 |
|
|
|a New York, NY
|b Springer New York
|c 2015, 2015
|
300 |
|
|
|a VI, 80 p. 18 illus., 3 illus. in color
|b online resource
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Computer and Information Systems Applications
|
700 |
1 |
|
|a Reeves, Douglas
|e [author]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a SpringerBriefs in Computer Science
|
028 |
5 |
0 |
|a 10.1007/978-1-4939-3441-6
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-1-4939-3441-6?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.3
|
520 |
|
|
|a This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable
|