Jump to ratings and reviews
Rate this book

Traceback and Anonymity

Rate this book
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.   Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

86 pages, Paperback

First published December 22, 2015

About the author

Xinyuan Wang

12 books1 follower
Xinyuan Wang is a Ph.D. candidate at the Department of Anthropology, UCL. She obtained her MSc from the UCL’s Digital Anthropology Programme. She is an artist in Chinese traditional painting and calligraphy. She translated (Horst and Miller Eds.) Digital Anthropology into Chinese and contributed a piece on Digital Anthropology in China.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.