語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Traceback and anonymity[electronic r...
~
Reeves, Douglas.
Traceback and anonymity[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8
書名/作者:
Traceback and anonymity/ by Xinyuan Wang, Douglas Reeves.
作者:
Wang, Xinyuan.
其他作者:
Reeves, Douglas.
出版者:
New York, NY : : Springer New York :, 2015.
面頁冊數:
vi, 80 p. : : ill., digital ;; 24 cm.
Contained By:
Springer eBooks
標題:
Computer security.
標題:
Cyberspace - Security measures.
標題:
Computer crimes - Prevention.
標題:
Cyberterrorism - Prevention.
標題:
Computer Science.
標題:
Computer Applications.
ISBN:
9781493934416
ISBN:
9781493934393
摘要、提要註:
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
電子資源:
http://dx.doi.org/10.1007/978-1-4939-3441-6
Traceback and anonymity[electronic resource] /
Wang, Xinyuan.
Traceback and anonymity
[electronic resource] /by Xinyuan Wang, Douglas Reeves. - New York, NY :Springer New York :2015. - vi, 80 p. :ill., digital ;24 cm. - SpringerBriefs in computer science,2191-5768. - SpringerBriefs in computer science..
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
ISBN: 9781493934416
Standard No.: 10.1007/978-1-4939-3441-6doiSubjects--Topical Terms:
338952
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Traceback and anonymity[electronic resource] /
LDR
:01793nam a2200313 a 4500
001
443801
003
DE-He213
005
20160421150051.0
006
m d
007
cr nn 008maaau
008
160715s2015 nyu s 0 eng d
020
$a
9781493934416
$q
(electronic bk.)
020
$a
9781493934393
$q
(paper)
024
7
$a
10.1007/978-1-4939-3441-6
$2
doi
035
$a
978-1-4939-3441-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UB
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
W246 2015
100
1
$a
Wang, Xinyuan.
$3
634820
245
1 0
$a
Traceback and anonymity
$h
[electronic resource] /
$c
by Xinyuan Wang, Douglas Reeves.
260
$a
New York, NY :
$b
Springer New York :
$b
Imprint: Springer,
$c
2015.
300
$a
vi, 80 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in computer science,
$x
2191-5768
520
$a
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
650
0
$a
Computer security.
$3
338952
650
0
$a
Cyberspace
$x
Security measures.
$3
542491
650
0
$a
Computer crimes
$x
Prevention.
$3
405109
650
0
$a
Cyberterrorism
$x
Prevention.
$3
542490
650
1 4
$a
Computer Science.
$3
423143
650
2 4
$a
Computer Applications.
$3
467030
700
1
$a
Reeves, Douglas.
$3
634821
710
2
$a
SpringerLink (Online service)
$3
463450
773
0
$t
Springer eBooks
830
0
$a
SpringerBriefs in computer science.
$3
466946
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4939-3441-6
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-1-4939-3441-6
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入