|
Showing 1 - 5 of
5 matches in All Departments
This brief systematically examines the trackback problem and its
interaction with low-latency anonymous communication. First, it
provides an overview of the common techniques a network-based
attack may use to hide its origin and identity. Then the authors
explore the MIX-based anonymity and the building blocks of
low-latency anonymous communication. Later chapters offer a
comprehensive study of the timing attacks on low-latency anonymous
communication, and analyze the fundamental limitations of
low-latency anonymous communication from the perspective of
timing-based covert channel. Suitable for professionals and
researchers, Traceback and Anonymity is a close look at a key
aspect of cyber security studies. Advanced-level students
interested in cyber security techniques or networking will also
find the content valuable.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Barbie
Margot Robbie, Ryan Gosling
Blu-ray disc
R266
Discovery Miles 2 660
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.