Traceback and Anonymity

  • Xinyuan Wang
  • Douglas Reeves

Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Table of contents

  1. Front Matter
    Pages i-vi
  2. Xinyuan Wang, Douglas Reeves
    Pages 1-3
  3. Xinyuan Wang, Douglas Reeves
    Pages 5-13
  4. Xinyuan Wang, Douglas Reeves
    Pages 15-22
  5. Xinyuan Wang, Douglas Reeves
    Pages 23-47
  6. Xinyuan Wang, Douglas Reeves
    Pages 49-56
  7. Xinyuan Wang, Douglas Reeves
    Pages 57-74
  8. Xinyuan Wang, Douglas Reeves
    Pages 75-76
  9. Back Matter
    Pages 77-80

About this book


This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.


Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.


Traceback Low-latency anonymous network Anonymity Timing attack Flow watermarking

Authors and affiliations

  • Xinyuan Wang
    • 1
  • Douglas Reeves
    • 2
  1. 1.Department of Computer ScienceGeorge Mason UniversityFairfaxUSA
  2. 2.Department of Computer ScienceNorth Carolina State UniversityRaleighUSA

Bibliographic information

Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods