Traceback and anonymity / (Record no. 23137)

MARC details
000 -LEADER
fixed length control field 01794cam a22002895a 4500
001 - CONTROL NUMBER
control field 18805860
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20201128024002.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151002t2015 nyua frb 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781493934393
040 ## - CATALOGING SOURCE
Original cataloging agency YDXCP
Language of cataloging eng
Transcribing agency YDXCP
Modifying agency BTCTA
-- OCLCO
-- SUC
-- OCLCO
-- S4S
-- DLC
-- EG-ScBUE
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 22
Classification number 005.8
Item number WAN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Wang, Xinyuan
Titles and other words associated with a name (Computer scientist),
245 10 - TITLE STATEMENT
Title Traceback and anonymity /
Statement of responsibility, etc Xinyuan Wang, Douglas Reeves.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc c.2015.
300 ## - PHYSICAL DESCRIPTION
Extent vi, 80 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 0# - Series Statement
Series statement SpringerBriefs in computer science,
International Standard Serial Number 2191-5768.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Bibliography : p. 77-80.
520 ## - SUMMARY, ETC.
Summary, etc This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Source of heading or term BUEsh
9 (RLIN) 2637
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberspace
General subdivision Security measures.
Source of heading or term BUEsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Prevention.
Source of heading or term BUEsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberterrorism
General subdivision Prevention.
Source of heading or term BUEsh
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Source of heading or term BUEsh
653 ## - INDEX TERM--UNCONTROLLED
Resource For college Informatics and Computer Science
Arrived date list November2016
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Reeves, Douglas S.,
Dates associated with a name 1953-
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 2016-11-15
Holdings
Withdrawn status Item status Source of classification or shelving scheme Damaged status Not for loan Vendor Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Total Checkouts Full call number Barcode Date last seen Cost, replacement price Koha item type
    Dewey Decimal Classification     Baccah Central Library Central Library Lower Floor 15/11/2016 Purchase 575.00 25137   005.8 WAN 000034782 11/06/2024 718.75 Book - Borrowing