![cover image of Traceback and Anonymity](https://img1.od-cdn.com/ImageType-400/7614-1/E2D/2E3/B9/{E2D2E3B9-132B-4F7E-AF28-38738A0F918B}Img400.jpg)
Sign up to save your library
With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.
Find this title in Libby, the library reading app by OverDrive.
![LibbyDevices.png](https://images.contentstack.io/v3/assets/blt3d151d94546d0edd/blt96637953bca8f11b/642dbad30afb1c108e793645/LibbyDevices.png)
Search for a digital library with this title
Title found at these libraries:
Loading... |
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.
Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.