|
Showing 1 - 7 of
7 matches in All Departments
This brief systematically examines the trackback problem and its
interaction with low-latency anonymous communication. First, it
provides an overview of the common techniques a network-based
attack may use to hide its origin and identity. Then the authors
explore the MIX-based anonymity and the building blocks of
low-latency anonymous communication. Later chapters offer a
comprehensive study of the timing attacks on low-latency anonymous
communication, and analyze the fundamental limitations of
low-latency anonymous communication from the perspective of
timing-based covert channel. Suitable for professionals and
researchers, Traceback and Anonymity is a close look at a key
aspect of cyber security studies. Advanced-level students
interested in cyber security techniques or networking will also
find the content valuable.
|
You may like...
Hoe Ek Dit Onthou
Francois Van Coke, Annie Klopper
Paperback
R300
R219
Discovery Miles 2 190
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.