Image from Google Jackets

Traceback and anonymity / Xinyuan Wang, Douglas Reeves.

By: Contributor(s): Material type: TextTextSeries: SpringerBriefs in computer sciencePublication details: New York : Springer, c.2015.Description: vi, 80 p. : ill. ; 24 cmISBN:
  • 9781493934393
Subject(s): DDC classification:
  • 22 005.8 WAN
Summary: This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Vol info Status Date due Barcode Item holds
Book - Borrowing Book - Borrowing Central Library Lower Floor Baccah 005.8 WAN (Browse shelf(Opens below)) 25137 Available 000034782
Total holds: 0

Bibliography : p. 77-80.

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

There are no comments on this title.

to post a comment.