000 01794cam a22002895a 4500
001 18805860
005 20201128024002.0
008 151002t2015 nyua frb 000 0 eng d
020 _a9781493934393
040 _aYDXCP
_beng
_cYDXCP
_dBTCTA
_dOCLCO
_dSUC
_dOCLCO
_dS4S
_dDLC
_dEG-ScBUE
082 0 4 _222
_a005.8
_bWAN
100 1 _aWang, Xinyuan
_c(Computer scientist),
245 1 0 _aTraceback and anonymity /
_cXinyuan Wang, Douglas Reeves.
260 _aNew York :
_bSpringer,
_cc.2015.
300 _avi, 80 p. :
_bill. ;
_c24 cm.
490 0 _aSpringerBriefs in computer science,
_x2191-5768.
504 _aBibliography : p. 77-80.
520 _aThis brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
650 7 _aComputer security
_2BUEsh
_92637
650 7 _aCyberspace
_xSecurity measures.
_2BUEsh
650 7 _aComputer crimes
_xPrevention.
_2BUEsh
650 7 _aCyberterrorism
_xPrevention.
_2BUEsh
651 _2BUEsh
653 _bCOMSCI
_cNovember2016
700 1 _aReeves, Douglas S.,
_d1953-
942 _2ddc
999 _c23137
_d23109