Wir verwenden Cookies und Analyse-Tools, um die Nutzerfreundlichkeit der Internet-Seite zu verbessern und für Marketingzwecke. Wenn Sie fortfahren, diese Seite zu verwenden, nehmen wir an, dass Sie damit einverstanden sind. Zur Datenschutzerklärung.
Traceback and Anonymity
Details
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.
Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
Inhalt
Introduction. The Traceback Problem.- Existing Approaches in Traceback.- Active Timing Based Traceback.-Anonymity.-Fundamental Limitations in Low-Latency Anonymity Systems.- Conclusion.
Weitere Informationen
- Allgemeine Informationen
- GTIN 09781493934393
- Herausgeber Springer New York
- Anzahl Seiten 88
- Lesemotiv Verstehen
- Genre Software
- Auflage 1st edition 2015
- Sprache Englisch
- Gewicht 149g
- Untertitel SpringerBriefs in Computer Science
- Autor Douglas Reeves , Xinyuan Wang
- Größe H235mm x B155mm x T6mm
- Jahr 2015
- EAN 9781493934393
- Format Kartonierter Einband
- ISBN 1493934392
- Veröffentlichung 19.11.2015
- Titel Traceback and Anonymity