Traceback and Anonymity

Nonfiction, Computers, Database Management, Data Processing, General Computing
Cover of the book Traceback and Anonymity by Xinyuan Wang, Douglas Reeves, Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Xinyuan Wang, Douglas Reeves ISBN: 9781493934416
Publisher: Springer New York Publication: November 18, 2015
Imprint: Springer Language: English
Author: Xinyuan Wang, Douglas Reeves
ISBN: 9781493934416
Publisher: Springer New York
Publication: November 18, 2015
Imprint: Springer
Language: English

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.

 

Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.

 

Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

More books from Springer New York

Cover of the book Ischemia and Loss of Vascular Autoregulation in Ocular and Cerebral Diseases by Xinyuan Wang, Douglas Reeves
Cover of the book The ASMBS Textbook of Bariatric Surgery by Xinyuan Wang, Douglas Reeves
Cover of the book Residue Reviews by Xinyuan Wang, Douglas Reeves
Cover of the book Reviews of Environmental Contamination and Toxicology Volume 223 by Xinyuan Wang, Douglas Reeves
Cover of the book Philosophy and Psychopathology by Xinyuan Wang, Douglas Reeves
Cover of the book Graphene for Transparent Conductors by Xinyuan Wang, Douglas Reeves
Cover of the book Guide to Psychological Assessment with African Americans by Xinyuan Wang, Douglas Reeves
Cover of the book BONUS Algorithm for Large Scale Stochastic Nonlinear Programming Problems by Xinyuan Wang, Douglas Reeves
Cover of the book Clinical Guide to Mental Disability Evaluations by Xinyuan Wang, Douglas Reeves
Cover of the book Reeder and Felson’s Gamuts in Cardiovascular Radiology by Xinyuan Wang, Douglas Reeves
Cover of the book The MRI Study Guide for Technologists by Xinyuan Wang, Douglas Reeves
Cover of the book High Density Lipoproteins, Dyslipidemia, and Coronary Heart Disease by Xinyuan Wang, Douglas Reeves
Cover of the book Make Time for the Stars by Xinyuan Wang, Douglas Reeves
Cover of the book Advanced Symbolic Analysis for VLSI Systems by Xinyuan Wang, Douglas Reeves
Cover of the book Handbook of Humor Research by Xinyuan Wang, Douglas Reeves
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy