01946cam a22003015a 45000010009000000050017000090080041000260200018000670400068000850820019001531000041001722450061002132600035002743000032003094900052003415040029003935200835004226500035012576500042012926500040013346500039013746510010014136530025014237000031014489420008014799990017014879520140015041880586020201128024002.0151002t2015 nyua frb 000 0 eng d a9781493934393 aYDXCPbengcYDXCPdBTCTAdOCLCOdSUCdOCLCOdS4SdDLCdEG-ScBUE04222a005.8bWAN1 aWang, Xinyuanc(Computer scientist),10aTraceback and anonymity /cXinyuan Wang, Douglas Reeves. aNew York :bSpringer,cc.2015. avi, 80 p. :bill. ;c24 cm.0 aSpringerBriefs in computer science,x2191-5768. aBibliography : p. 77-80. aThis brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable. 7aComputer security2BUEsh92637 7aCyberspacexSecurity measures.2BUEsh 7aComputer crimesxPrevention.2BUEsh 7aCyberterrorismxPrevention.2BUEsh 2BUEsh bCOMSCIcNovember20161 aReeves, Douglas S.,d1953- 2ddc c23137d23109 00102ddc40708BaccahaMAINbMAINcLOWd2016-11-15ePurchaseg575.00h25137l0o005.8 WANp000034782r2025-07-15 00:00:00v718.75yBB