MARC details
000 -LEADER |
fixed length control field |
01794cam a22002895a 4500 |
001 - CONTROL NUMBER |
control field |
18805860 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20201128024002.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
151002t2015 nyua frb 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781493934393 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
YDXCP |
Language of cataloging |
eng |
Transcribing agency |
YDXCP |
Modifying agency |
BTCTA |
-- |
OCLCO |
-- |
SUC |
-- |
OCLCO |
-- |
S4S |
-- |
DLC |
-- |
EG-ScBUE |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
22 |
Classification number |
005.8 |
Item number |
WAN |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Wang, Xinyuan |
Titles and other words associated with a name |
(Computer scientist), |
245 10 - TITLE STATEMENT |
Title |
Traceback and anonymity / |
Statement of responsibility, etc |
Xinyuan Wang, Douglas Reeves. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York : |
Name of publisher, distributor, etc |
Springer, |
Date of publication, distribution, etc |
c.2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
vi, 80 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
490 0# - Series Statement |
Series statement |
SpringerBriefs in computer science, |
International Standard Serial Number |
2191-5768. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Bibliography : p. 77-80. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
Source of heading or term |
BUEsh |
9 (RLIN) |
2637 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cyberspace |
General subdivision |
Security measures. |
Source of heading or term |
BUEsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Prevention. |
Source of heading or term |
BUEsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cyberterrorism |
General subdivision |
Prevention. |
Source of heading or term |
BUEsh |
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME |
Source of heading or term |
BUEsh |
653 ## - INDEX TERM--UNCONTROLLED |
Resource For college |
Informatics and Computer Science |
Arrived date list |
November2016 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Reeves, Douglas S., |
Dates associated with a name |
1953- |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
-- |
2016-11-15 |