Traceback and anonymity [electronic resource] / Xinyuan Wang, Douglas Reeves.
2015
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Traceback and anonymity [electronic resource] / Xinyuan Wang, Douglas Reeves.
Author
Wang, Xinyuan, author.
ISBN
9781493934416 electronic book
1493934414 electronic book
9781493934393
1493934414 electronic book
9781493934393
Published
New York : Springer, 2015.
Language
English
Description
1 online resource.
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
Bibliography, etc. Note
Includes bibliographical references.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (viewed December 3, 2015)
Added Author
Reeves, Douglas B., 1953- author.
Series
SpringerBriefs in computer science.
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources