Home
Traceback and Anonymity
Barnes and Noble
Loading Inventory...
Traceback and Anonymity in Bloomington, MN
Current price: $54.99

Traceback and Anonymity in Bloomington, MN
Current price: $54.99
Loading Inventory...
Size: OS
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.
Suitable for professionals and researchers,
Traceback and Anonymity
is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
Suitable for professionals and researchers,
Traceback and Anonymity
is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.
Suitable for professionals and researchers,
Traceback and Anonymity
is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
Suitable for professionals and researchers,
Traceback and Anonymity
is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.
![Wellspring [Barnes & Noble Exclusive]](https://prodimage.images-bn.com/pimages/0884501047746_p0_v1_s600x595.jpg)
![GOLDEN [SUBSTANCE] [Barnes & Noble Exclusive]](https://prodimage.images-bn.com/pimages/0196922572838_p0_v1_s600x595.jpg)




![Shadowland [Barnes & Noble Exclusive]](https://prodimage.images-bn.com/pimages/0093624920434_p0_v2_s600x595.jpg)
![C'mon [Barnes & Noble Exclusive]](https://prodimage.images-bn.com/pimages/0751937362326_p0_v1_s600x595.jpg)
![Zaz [Barnes & Noble Exclusive]](https://prodimage.images-bn.com/pimages/0886977447327_p0_v1_s600x595.jpg)

![Wonderland [Barnes & Noble Exclusive]](https://prodimage.images-bn.com/pimages/0602557155105_p0_v4_s600x595.jpg)






