000 02322nam a22004455i 4500
001 978-1-4939-3441-6
003 DE-He213
005 20200420220219.0
007 cr nn 008mamaa
008 151118s2015 xxu| s |||| 0|eng d
020 _a9781493934416
_9978-1-4939-3441-6
024 7 _a10.1007/978-1-4939-3441-6
_2doi
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM018000
_2bisacsh
082 0 4 _a004
_223
100 1 _aWang, Xinyuan.
_eauthor.
245 1 0 _aTraceback and Anonymity
_h[electronic resource] /
_cby Xinyuan Wang, Douglas Reeves.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2015.
300 _aVI, 80 p. 18 illus., 3 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5768
520 _aThis brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.   Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
650 0 _aComputer science.
650 0 _aApplication software.
650 1 4 _aComputer Science.
650 2 4 _aComputer Applications.
700 1 _aReeves, Douglas.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781493934393
830 0 _aSpringerBriefs in Computer Science,
_x2191-5768
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4939-3441-6
912 _aZDB-2-SCS
942 _cEBK
999 _c51782
_d51782