Traceback and anonymity
著者
書誌事項
Traceback and anonymity
(SpringerBriefs in computer science)
Springer, c2015
大学図書館所蔵 件 / 全1件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes bibliographical references (p. 77-80)
内容説明・目次
内容説明
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.
Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
目次
Introduction. The Traceback Problem.- Existing Approaches in Traceback.- Active Timing Based Traceback.-Anonymity.-Fundamental Limitations in Low-Latency Anonymity Systems.- Conclusion.
「Nielsen BookData」 より