| 000 | 02524nam a22004575i 4500 | ||
|---|---|---|---|
| 001 | 200433638 | ||
| 003 | TR-AnTOB | ||
| 005 | 20260122130538.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 151118s2015 xxu| s |||| 0|eng d | ||
| 020 |
_a9781493934416 _z978-1-4939-3441-6 |
||
| 024 | 7 |
_a10.1007/978-1-4939-3441-6 _2doi |
|
| 040 |
_aDLC _beng _erda _cDLC _dTR-AnTOB |
||
| 041 | 0 | _aeng | |
| 050 | 4 | _aQA76.76.A65 | |
| 072 | 7 |
_aUB _2bicssc |
|
| 072 | 7 |
_aCOM018000 _2bisacsh |
|
| 072 | 7 |
_aUB _2thema004 _223 |
|
| 100 | 1 |
_aWang, Xinyuan _c(Computer scientist) _eauthor _4aut _4http://id.loc.gov/vocabulary/relators/aut _9152026 |
|
| 245 | 1 | 0 |
_aTraceback and anonymity / _cXinyuan Wang, Douglas Reeves. |
| 264 | 1 |
_aNew York, NY : _bSpringer New York : _bImprint: Springer, _c2015. |
|
| 300 | _a1 online resource | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
| 520 | _aThis brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable. | ||
| 650 | 0 |
_aComputer security _9912 |
|
| 650 | 1 | 0 |
_aComputer networks _xSecurity measures _947 |
| 650 | 1 | 0 |
_aCyberspace _xSecurity measures _9125946 |
| 650 | 1 | 7 |
_aComputer crimes _xPrevention _935095 |
| 650 | 1 | 0 |
_aCyberterrorism _xPrevention _9125948 |
| 655 | 0 |
_aElectronic books _92032 |
|
| 700 | 1 |
_aReeves, Douglas S., _d1953- _eauthor _4aut _4http://id.loc.gov/vocabulary/relators/aut _9152027 |
|
| 710 | 2 |
_aSpringerLink (Online service) _959873 |
|
| 856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-1-4939-3441-6 _3Springer eBooks _zOnline access link to the resource |
| 942 |
_2lcc _cEBK |
||
| 999 |
_c200433638 _d51850 |
||