Vai al contenuto principale della pagina
| Autore: |
Wang Xinyuan
|
| Titolo: |
Traceback and Anonymity / / by Xinyuan Wang, Douglas Reeves
|
| Pubblicazione: | New York, NY : , : Springer New York : , : Imprint : Springer, , 2015 |
| Edizione: | 1st ed. 2015. |
| Descrizione fisica: | 1 online resource (84 p.) |
| Disciplina: | 005.8 |
| Soggetto topico: | Application software |
| Computer Applications | |
| Persona (resp. second.): | ReevesDouglas |
| Note generali: | Description based upon print version of record. |
| Nota di bibliografia: | Includes bibliographical references. |
| Sommario/riassunto: | This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable. |
| Titolo autorizzato: | Traceback and Anonymity ![]() |
| ISBN: | 1-4939-3441-4 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910299223703321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |