Results 11 to 20 of about 118,541 (255)

Anonymous and secret communication in quantum networks

open access: yesNew Journal of Physics, 2021
Secure communication is one of the key applications of quantum networks. In recent years, following the demands for identity protection in classical communication protocols, the need for anonymity has also emerged for quantum networks.
Christopher Thalacker   +4 more
doaj   +1 more source

Anonymous Communication on the Internet [PDF]

open access: yesInSITE Conference, 2014
There are many kinds of systems developed for anonymous communication on the internet. We survey a number of systems and evaluate their security. Among these systems we compare functionalities like Onion Routing, anonymous VPN services, probabilistic anonymity, and deterministic anonymity.
Kaj J. Grahn   +2 more
openaire   +2 more sources

How To Bootstrap Anonymous Communication [PDF]

open access: yesProceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
15 ...
Jakobsen, Sune K., Orlandi, Claudio
openaire   +3 more sources

FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks

open access: yesSensors, 2020
Anonymous technology is an effective way for protecting users’ privacy. Anonymity in sensor networks is to prevent the unauthorized third party from revealing the identities of the communication parties.
Fengyin Li   +5 more
doaj   +1 more source

A Survey on Measuring Anonymity in Anonymous Communication Systems

open access: yesIEEE Access, 2019
The popularity of Internet applications has made communication privacy an increasingly important security requirement. As an important aspect of privacy, anonymity ensures that a subject may use resources or services without disclosing user identity or ...
Tianbo Lu, Zeyu Du, Z. Jane Wang
doaj   +1 more source

Improved method of Tor network flow watermarks based on IPD interval

open access: yes网络与信息安全学报, 2019
Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings ...
Jie DU, Yongzhong HE, Ye DU
doaj   +3 more sources

Accountable Anonymous Communication [PDF]

open access: yes, 2007
In this chapter we motivate the need for anonymity at the communication layer and describe the potential risks of having traceable communications. We then introduce the legal requirements on data retention and motivate the need for revocability of anonymity upon the request of law enforcement.
Claudia Diaz, Bart Preneel
openaire   +1 more source

Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing

open access: yesIEEE Access, 2020
Cloud computing has emerged as a promising paradigm for the Internet of Things (IoT) and Cyber-Physical-Social Systems (CPSS). However, the problem of how to ensure the security of data transmission and data storage in CPSS is a key issue to address.
Fengyin Li   +6 more
doaj   +1 more source

Analysis on anonymity of P2P anonymous communication system [PDF]

open access: yesProceedings of the 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering 2015, 2015
Most of existing anonymous communication systems adopt "mixes" nodes to encrypt and relay the communication messages. Extensive works have been done on this field to find methods that can effectively resist the attacks. However, the adversaries can perform the attacks through the relationship between multiple nodes communication traffic to deanonymize ...
Qiaoyan Wen, Hua Zhang, Chenfei Xu
openaire   +1 more source

SACT: A New Model of Covert Communication Based on SDN

open access: yesSensors, 2020
Anonymous tracking technology of network watermarking is limited by the deployment of tracking devices in traditional network structure, resulting in poor scalability and reusability.
Leyi Shi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy