|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910299223703321 |
|
|
Autore |
Wang Xinyuan |
|
|
Titolo |
Traceback and Anonymity [[electronic resource] /] / by Xinyuan Wang, Douglas Reeves |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, NY : , : Springer New York : , : Imprint : Springer, , 2015 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2015.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (84 p.) |
|
|
|
|
|
|
Collana |
|
SpringerBriefs in Computer Science, , 2191-5768 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Application software |
Computer Applications |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Sommario/riassunto |
|
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable. |
|
|
|
|
|
|
|