Traceback and Anonymity
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the buil...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | Wang, Xinyuan (Autor), Reeves, Douglas (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer New York : Imprint: Springer,
2015.
|
Edición: | 1st ed. 2015. |
Colección: | SpringerBriefs in Computer Science,
|
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings /
Publicado: (2016) -
Hagenberg Business Process Modelling Method
por: Kossak, Felix, et al.
Publicado: (2016) -
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
por: Lu, Zhou, et al.
Publicado: (2015) -
Designing Interfaces in Public Settings Understanding the Role of the Spectator in Human-Computer Interaction /
por: Reeves, Stuart
Publicado: (2011) -
Seminal Contributions to Information Systems Engineering 25 Years of CAiSE /
Publicado: (2013)