000737526 000__ 02429cam\a2200457Ii\4500 000737526 001__ 737526 000737526 005__ 20230306141045.0 000737526 006__ m\\\\\o\\d\\\\\\\\ 000737526 007__ cr\cn\nnnunnun 000737526 008__ 151119s2015\\\\nyu\\\\\ob\\\\000\0\eng\d 000737526 020__ $$a9781493934416$$qelectronic book 000737526 020__ $$a1493934414$$qelectronic book 000737526 020__ $$z9781493934393 000737526 035__ $$aSP(OCoLC)ocn929952102 000737526 035__ $$aSP(OCoLC)929952102 000737526 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dIDEBK$$dYDXCP$$dN$T$$dOCLCO$$dAZU 000737526 049__ $$aISEA 000737526 050_4 $$aQA76.9.A25 000737526 08204 $$a005.8$$223 000737526 1001_ $$aWang, Xinyuan,$$eauthor. 000737526 24510 $$aTraceback and anonymity$$h[electronic resource] /$$cXinyuan Wang, Douglas Reeves. 000737526 264_1 $$aNew York :$$bSpringer,$$c2015. 000737526 300__ $$a1 online resource. 000737526 336__ $$atext$$btxt$$2rdacontent 000737526 337__ $$acomputer$$bc$$2rdamedia 000737526 338__ $$aonline resource$$bcr$$2rdacarrier 000737526 4901_ $$aSpringerBriefs in computer science 000737526 504__ $$aIncludes bibliographical references. 000737526 506__ $$aAccess limited to authorized users. 000737526 520__ $$aThis brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable. 000737526 588__ $$aOnline resource; title from PDF title page (viewed December 3, 2015) 000737526 650_0 $$aComputer security. 000737526 650_0 $$aCyberspace$$xSecurity measures. 000737526 650_0 $$aComputer crimes$$xPrevention. 000737526 650_0 $$aCyberterrorism$$xPrevention. 000737526 7001_ $$aReeves, Douglas B.,$$d1953-$$eauthor. 000737526 830_0 $$aSpringerBriefs in computer science. 000737526 85280 $$bebk$$hSpringerLink 000737526 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4939-3441-6$$zOnline Access$$91397441.1 000737526 909CO $$ooai:library.usi.edu:737526$$pGLOBAL_SET 000737526 980__ $$aEBOOK 000737526 980__ $$aBIB 000737526 982__ $$aEbook 000737526 983__ $$aOnline 000737526 994__ $$a92$$bISE