Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (7 chapters)
-
Front Matter
-
Back Matter
About this book
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.
Â
Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
Authors and Affiliations
-
Department of Computer Science, George Mason University, Fairfax, USA
Xinyuan Wang
-
Department of Computer Science, North Carolina State University, Raleigh, USA
Douglas Reeves
Bibliographic Information
Book Title: Traceback and Anonymity
Authors: Xinyuan Wang, Douglas Reeves
Series Title: SpringerBriefs in Computer Science
DOI: https://doi.org/10.1007/978-1-4939-3441-6
Publisher: Springer New York, NY
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Author(s) 2015
Softcover ISBN: 978-1-4939-3439-3Published: 19 November 2015
eBook ISBN: 978-1-4939-3441-6Published: 18 November 2015
Series ISSN: 2191-5768
Series E-ISSN: 2191-5776
Edition Number: 1
Number of Pages: VI, 80
Number of Illustrations: 15 b/w illustrations, 3 illustrations in colour
Topics: Computer Applications