Traceback and anonymity /

Wang, Xinyuan (Computer scientist),

Traceback and anonymity / Xinyuan Wang, Douglas Reeves. - New York : Springer, c.2015. - vi, 80 p. : ill. ; 24 cm. - SpringerBriefs in computer science, 2191-5768. .

Bibliography : p. 77-80.

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

9781493934393


Computer security
Cyberspace--Security measures.
Computer crimes--Prevention.
Cyberterrorism--Prevention.





005.8 / WAN