000 02524nam a22004575i 4500
001 200433638
003 TR-AnTOB
005 20260122130538.0
007 cr nn 008mamaa
008 151118s2015 xxu| s |||| 0|eng d
020 _a9781493934416
_z978-1-4939-3441-6
024 7 _a10.1007/978-1-4939-3441-6
_2doi
040 _aDLC
_beng
_erda
_cDLC
_dTR-AnTOB
041 0 _aeng
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM018000
_2bisacsh
072 7 _aUB
_2thema004
_223
100 1 _aWang, Xinyuan
_c(Computer scientist)
_eauthor
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_9152026
245 1 0 _aTraceback and anonymity /
_cXinyuan Wang, Douglas Reeves.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aSpringerBriefs in Computer Science,
_x2191-5768
520 _aThis brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
650 0 _aComputer security
_9912
650 1 0 _aComputer networks
_xSecurity measures
_947
650 1 0 _aCyberspace
_xSecurity measures
_9125946
650 1 7 _aComputer crimes
_xPrevention
_935095
650 1 0 _aCyberterrorism
_xPrevention
_9125948
655 0 _aElectronic books
_92032
700 1 _aReeves, Douglas S.,
_d1953-
_eauthor
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_9152027
710 2 _aSpringerLink (Online service)
_959873
856 4 0 _uhttps://doi.org/10.1007/978-1-4939-3441-6
_3Springer eBooks
_zOnline access link to the resource
942 _2lcc
_cEBK
999 _c200433638
_d51850