Xinyuan Wang & Douglas Reeves 
Traceback and Anonymity [PDF ebook] 

الدعم

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.

 

Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

€53.49
طرق الدفع

قائمة المحتويات

Introduction. The Traceback Problem.- Existing Approaches in Traceback.- Active Timing Based Traceback.-Anonymity.-Fundamental Limitations in Low-Latency Anonymity Systems.- Conclusion.

قم بشراء هذا الكتاب الإلكتروني واحصل على كتاب آخر مجانًا!
لغة الإنجليزية ● شكل PDF ● صفحات 80 ● ISBN 9781493934416 ● حجم الملف 1.9 MB ● الناشر Springer New York ● مدينة NY ● بلد US ● نشرت 2015 ● للتحميل 24 الشهور ● دقة EUR ● هوية شخصية 4690650 ● حماية النسخ DRM الاجتماعية

المزيد من الكتب الإلكترونية من نفس المؤلف (المؤلفين) / محرر

16٬913 كتب إلكترونية في هذه الفئة