Scientific Library of Tomsk State University

   E-catalog        

Image from Google Jackets
Normal view MARC view

Traceback and Anonymity electronic resource by Xinyuan Wang, Douglas Reeves.

By: Wang, Xinyuan [author.]Contributor(s): Reeves, Douglas [author.] | SpringerLink (Online service)Material type: TextTextSeries: SpringerBriefs in Computer SciencePublication details: New York, NY : Springer New York : Imprint: Springer, 2015Edition: 1st ed. 2015Description: VI, 80 p. 18 illus., 3 illus. in color. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781493934416Subject(s): Computer Science | Application software | Computer Science | Computer ApplicationsDDC classification: 004 LOC classification: QA76.76.A65Online resources: Click here to access online In: Springer eBooksSummary: This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.   Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.   Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

There are no comments on this title.

to post a comment.