Traceback and anonymity / Xinyuan Wang, Douglas Reeves.
Material type:
TextLanguage: İngilizce Series: SpringerBriefs in Computer SciencePublisher: New York, NY : Springer New York : Imprint: Springer, 2015Description: 1 online resourceContent type: - text
- computer
- online resource
- 9781493934416
- QA76.76.A65
| Item type | Current library | Home library | Collection | Call number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
E-Book
|
Merkez Kütüphane | Merkez Kütüphane | E-Kitap Koleksiyonu | QA76.76.A65EBK (Browse shelf(Opens below)) | Geçerli değil-e-Kitap / Not applicable-e-Book | EBK00958 |
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
There are no comments on this title.
