Results 11 to 20 of about 118,541 (255)
Anonymous and secret communication in quantum networks
Secure communication is one of the key applications of quantum networks. In recent years, following the demands for identity protection in classical communication protocols, the need for anonymity has also emerged for quantum networks.
Christopher Thalacker +4 more
doaj +1 more source
Anonymous Communication on the Internet [PDF]
There are many kinds of systems developed for anonymous communication on the internet. We survey a number of systems and evaluate their security. Among these systems we compare functionalities like Onion Routing, anonymous VPN services, probabilistic anonymity, and deterministic anonymity.
Kaj J. Grahn +2 more
openaire +2 more sources
How To Bootstrap Anonymous Communication [PDF]
15 ...
Jakobsen, Sune K., Orlandi, Claudio
openaire +3 more sources
FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks
Anonymous technology is an effective way for protecting users’ privacy. Anonymity in sensor networks is to prevent the unauthorized third party from revealing the identities of the communication parties.
Fengyin Li +5 more
doaj +1 more source
A Survey on Measuring Anonymity in Anonymous Communication Systems
The popularity of Internet applications has made communication privacy an increasingly important security requirement. As an important aspect of privacy, anonymity ensures that a subject may use resources or services without disclosing user identity or ...
Tianbo Lu, Zeyu Du, Z. Jane Wang
doaj +1 more source
Improved method of Tor network flow watermarks based on IPD interval
Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings ...
Jie DU, Yongzhong HE, Ye DU
doaj +3 more sources
Accountable Anonymous Communication [PDF]
In this chapter we motivate the need for anonymity at the communication layer and describe the potential risks of having traceable communications. We then introduce the legal requirements on data retention and motivate the need for revocability of anonymity upon the request of law enforcement.
Claudia Diaz, Bart Preneel
openaire +1 more source
Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing
Cloud computing has emerged as a promising paradigm for the Internet of Things (IoT) and Cyber-Physical-Social Systems (CPSS). However, the problem of how to ensure the security of data transmission and data storage in CPSS is a key issue to address.
Fengyin Li +6 more
doaj +1 more source
Analysis on anonymity of P2P anonymous communication system [PDF]
Most of existing anonymous communication systems adopt "mixes" nodes to encrypt and relay the communication messages. Extensive works have been done on this field to find methods that can effectively resist the attacks. However, the adversaries can perform the attacks through the relationship between multiple nodes communication traffic to deanonymize ...
Qiaoyan Wen, Hua Zhang, Chenfei Xu
openaire +1 more source
SACT: A New Model of Covert Communication Based on SDN
Anonymous tracking technology of network watermarking is limited by the deployment of tracking devices in traditional network structure, resulting in poor scalability and reusability.
Leyi Shi +4 more
doaj +1 more source

