Traceback and anonymity

著者

    • Wang, Xinyuan
    • Reeves, Douglas

書誌事項

Traceback and anonymity

Xinyuan Wang, Douglas Reeves

(SpringerBriefs in computer science)

Springer, c2015

大学図書館所蔵 件 / 1

この図書・雑誌をさがす

注記

Includes bibliographical references (p. 77-80)

内容説明・目次

内容説明

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

目次

Introduction. The Traceback Problem.- Existing Approaches in Traceback.- Active Timing Based Traceback.-Anonymity.-Fundamental Limitations in Low-Latency Anonymity Systems.- Conclusion.

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

  • NII書誌ID(NCID)
    BB20780650
  • ISBN
    • 9781493934393
  • 出版国コード
    us
  • タイトル言語コード
    eng
  • 本文言語コード
    eng
  • 出版地
    New York
  • ページ数/冊数
    vi, 80 p.
  • 大きさ
    24 cm
  • 分類
  • 件名
  • 親書誌ID
ページトップへ