000 02269nam a22003855i 4500
003 DE-He213
005 20231104114157.0
007 cr nn 008mamaa
008 151118s2015 xxu| s |||| 0|eng d
020 _a9781493934416
_z978-1-4939-3441-6
024 7 _a10.1007/978-1-4939-3441-6
_2doi
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM018000
_2bisacsh
072 7 _aUB
_2thema004
_223
100 1 _aWang, Xinyuan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aTraceback and Anonymity /
_cby Xinyuan Wang, Douglas Reeves.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aSpringerBriefs in Computer Science,
_x2191-5768
520 _aThis brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
650 0 _aComputer science.
650 1 4 _aComputer Applications.
_0http://scigraph.springernature.com/things/product-market-codes/I23001
700 1 _aReeves, Douglas.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
856 4 0 _uhttps://doi.org/10.1007/978-1-4939-3441-6
_3Springer eBooks
_zOnline access link to the resource
912 _aZDB-2-SCS
999 _c200433638
_d51850
942 _2lcc
_cEBK
041 _aeng