Traceback and Anonymity
53,49 €
inkl. 7% MwSt. und
ggf. zzgl. Versand
<p>This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.</p> <p> </p> <p>Suitable for professionals and researchers, <i>Traceback and Anonymity </i>is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.</p>
![Traceback and Anonymity Traceback and Anonymity](https://cos.richshop.de/servlet/images/9781493934416.jpg?w=300)
- Autor: Xinyuan Wang / Douglas Reeves
- Format: PDF
- DRM: social-drm (ohne Kopierschutz)
- Erscheinungsdatum: 18.11.2015
- Herausgeber: SPRINGER