Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (7 chapters)
Keywords
About this book
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.
Â
Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
Authors and Affiliations
Bibliographic Information
Book Title: Traceback and Anonymity
Authors: Xinyuan Wang, Douglas Reeves
Series Title: SpringerBriefs in Computer Science
DOI: https://doi.org/10.1007/978-1-4939-3441-6
Publisher: Springer New York, NY
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Author(s) 2015
Softcover ISBN: 978-1-4939-3439-3Published: 19 November 2015
eBook ISBN: 978-1-4939-3441-6Published: 18 November 2015
Series ISSN: 2191-5768
Series E-ISSN: 2191-5776
Edition Number: 1
Number of Pages: VI, 80
Number of Illustrations: 15 b/w illustrations, 3 illustrations in colour
Topics: Computer Applications