Cargando…

Traceback and Anonymity

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the buil...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Wang, Xinyuan (Autor), Reeves, Douglas (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer New York : Imprint: Springer, 2015.
Edición:1st ed. 2015.
Colección:SpringerBriefs in Computer Science,
Temas:
Acceso en línea:Texto Completo
Descripción
Sumario:This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.   Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
Descripción Física:VI, 80 p. 18 illus., 3 illus. in color. online resource.
ISBN:9781493934416
ISSN:2191-5776