000 02515nam a22004575i 4500
001 vtls000557110
003 RU-ToGU
005 20210922085115.0
007 cr nn 008mamaa
008 170212s2015 xxu| s |||| 0|eng d
020 _a9781493934416
_9978-1-4939-3441-6
024 7 _a10.1007/978-1-4939-3441-6
_2doi
035 _ato000557110
040 _aSpringer
_cSpringer
_dRU-ToGU
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM018000
_2bisacsh
082 0 4 _a004
_223
100 1 _aWang, Xinyuan.
_eauthor.
_9461450
245 1 0 _aTraceback and Anonymity
_helectronic resource
_cby Xinyuan Wang, Douglas Reeves.
250 _a1st ed. 2015.
260 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2015.
300 _aVI, 80 p. 18 illus., 3 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aSpringerBriefs in Computer Science,
_x2191-5768
520 _aThis brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.   Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
650 0 _aComputer Science.
_9155490
650 0 _aApplication software.
_9459955
650 1 4 _aComputer Science.
_9155490
650 2 4 _aComputer Applications.
_9303282
700 1 _aReeves, Douglas.
_eauthor.
_9461451
710 2 _aSpringerLink (Online service)
_9143950
773 0 _tSpringer eBooks
830 0 _aSpringerBriefs in Computer Science,
_9412137
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4939-3441-6
912 _aZDB-2-SCS
999 _c411575