Home » Nonfiction » Xinyuan Wang » Traceback and Anonymity

September 30 , 2007

Traceback and Anonymity


This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.

Download doc

Read also

Ecology of the Lakes of East-Central New York

Lakes of New York State, Volume III: Ecology of the Lakes of East-Central New York discusses the limnology of three lakes in the New York State-Otsego Lake (Glimmerglass), Canadarago Lake, and Saratoga Lake. This book is divided into three chapters. Chapter 1 describes Otsego Lake as one of the deeper lakes in the state with a maximum depth of…


Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

How to download book

Buy this book

You can buy this book now only for $41.59. This is the lowest price for this book.

Buy book

Download book free

If you want to download this book for free, please register, approve your account and get one book for free.


After that you may download book «Traceback and Anonymity»:

Download Torrent:


Download Sony BookReader: