Vai al contenuto principale della pagina
Autore: |
Wang Xinyuan
![]() |
Titolo: |
Traceback and Anonymity [[electronic resource] /] / by Xinyuan Wang, Douglas Reeves
![]() |
Pubblicazione: | New York, NY : , : Springer New York : , : Imprint : Springer, , 2015 |
Edizione: | 1st ed. 2015. |
Descrizione fisica: | 1 online resource (84 p.) |
Disciplina: | 005.8 |
Soggetto topico: | Application software |
Computer Applications | |
Persona (resp. second.): | ReevesDouglas |
Note generali: | Description based upon print version of record. |
Nota di bibliografia: | Includes bibliographical references. |
Sommario/riassunto: | This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable. |
Titolo autorizzato: | Traceback and Anonymity ![]() |
ISBN: | 1-4939-3441-4 |
Formato: | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910299223703321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |