000 | 01794cam a22002895a 4500 | ||
---|---|---|---|
001 | 18805860 | ||
005 | 20201128024002.0 | ||
008 | 151002t2015 nyua frb 000 0 eng d | ||
020 | _a9781493934393 | ||
040 |
_aYDXCP _beng _cYDXCP _dBTCTA _dOCLCO _dSUC _dOCLCO _dS4S _dDLC _dEG-ScBUE |
||
082 | 0 | 4 |
_222 _a005.8 _bWAN |
100 | 1 |
_aWang, Xinyuan _c(Computer scientist), |
|
245 | 1 | 0 |
_aTraceback and anonymity / _cXinyuan Wang, Douglas Reeves. |
260 |
_aNew York : _bSpringer, _cc.2015. |
||
300 |
_avi, 80 p. : _bill. ; _c24 cm. |
||
490 | 0 |
_aSpringerBriefs in computer science, _x2191-5768. |
|
504 | _aBibliography : p. 77-80. | ||
520 | _aThis brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable. | ||
650 | 7 |
_aComputer security _2BUEsh _92637 |
|
650 | 7 |
_aCyberspace _xSecurity measures. _2BUEsh |
|
650 | 7 |
_aComputer crimes _xPrevention. _2BUEsh |
|
650 | 7 |
_aCyberterrorism _xPrevention. _2BUEsh |
|
651 | _2BUEsh | ||
653 |
_bCOMSCI _cNovember2016 |
||
700 | 1 |
_aReeves, Douglas S., _d1953- |
|
942 | _2ddc | ||
999 |
_c23137 _d23109 |