img Leseprobe Leseprobe

Traceback and Anonymity

Douglas Reeves, Xinyuan Wang

PDF
ca. 53,49
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Springer New York img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Anwendungs-Software

Beschreibung

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.

 

Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

Weitere Titel in dieser Kategorie
Cover The Official Raspberry Pi Handbook 2025
The Makers of The MagPi magazine
Cover The Official Raspberry Pi Handbook 2024
The Makers of The MagPi magazine
Cover Coderspeak
Guilherme Orlandini Heurich
Cover Learn C++ by Example
Frances Buontempo

Kundenbewertungen

Schlagwörter

Flow watermarking, Low-latency anonymous network, Anonymity, Timing attack, Traceback