02713nam 22005655 450 991029922370332120200630183757.01-4939-3441-410.1007/978-1-4939-3441-6(CKB)3710000000514545(EBL)4096902(SSID)ssj0001584331(PQKBManifestationID)16265717(PQKBTitleCode)TC0001584331(PQKBWorkID)14865620(PQKB)11266174(DE-He213)978-1-4939-3441-6(MiAaPQ)EBC4096902(PPN)190522887(EXLCZ)99371000000051454520151118d2015 u| 0engur|n|---|||||txtccrTraceback and Anonymity[electronic resource] /by Xinyuan Wang, Douglas Reeves1st ed. 2015.New York, NY :Springer New York :Imprint: Springer,2015.1 online resource (84 p.)SpringerBriefs in Computer Science,2191-5768Description based upon print version of record.1-4939-3439-2 Includes bibliographical references.This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.   Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.SpringerBriefs in Computer Science,2191-5768Application softwareComputer Applicationshttps://scigraph.springernature.com/ontologies/product-market-codes/I23001Application software.Computer Applications.005.8Wang Xinyuanauthttp://id.loc.gov/vocabulary/relators/aut998501Reeves Douglasauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9910299223703321Traceback and Anonymity2517179UNINA