Traceback and Anonymity Traceback and Anonymity
    • £34.99

Publisher Description

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.

Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

GENRE
Computing & Internet
RELEASED
2015
18 November
LANGUAGE
EN
English
LENGTH
86
Pages
PUBLISHER
Springer New York
SIZE
1.6
MB
Computer Security – ESORICS 2022 Computer Security – ESORICS 2022
2022
Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
2022
Cryptology and Network Security Cryptology and Network Security
2018
Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
2021
Applied Cryptography and Network Security Applied Cryptography and Network Security
2022
Cryptology and Network Security Cryptology and Network Security
2007
Introduction to Space Archaeology Introduction to Space Archaeology
2024
Spatial Observation of Giant Panda Habitat Spatial Observation of Giant Panda Habitat
2023
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Agile Risk Management Agile Risk Management
2014
Introduction to Ethical Software Development Introduction to Ethical Software Development
2025
Machine Learning in Sports Machine Learning in Sports
2025
Objective Information Theory Objective Information Theory
2023
IoT Supply Chain Security Risk Analysis and Mitigation IoT Supply Chain Security Risk Analysis and Mitigation
2022