Results 1 to 10 of about 690,729 (282)
Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network
With the rise of the internet, there has been an increasing focus on user anonymity. Anonymous communication networks (ACNs) aim to protect the identity privacy of users in the network.
Xiance Meng, Mangui Liang
doaj +3 more sources
Anonymity for Practical Quantum Networks [PDF]
5 pages, published ...
Unnikrishnan, Anupama +5 more
openaire +4 more sources
Tor network anonymity evaluation based on node anonymity
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based ...
Jun Cui +3 more
doaj +2 more sources
De-anonymizing Social Networks [PDF]
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.
Narayanan, Arvind, Shmatikov, Vitaly
openaire +4 more sources
Anonymous traffic classification based on three-dimensional Markov image and deep learning [PDF]
Illegal elements use the characteristics of an anonymous network hidden service mechanism to build a dark network and conduct various illegal activities, which brings a serious challenge to network security.
Xin Tang +5 more
doaj +1 more source
A Traffic Splitting Algorithm for Load Balancing in Tor
As the most popular anonymous communication system, Tor provides anonymous protection for users by sending their messages through a series of relays. Due to the use of the bandwidth-weighted path selection algorithm, many more users choose routers with ...
Xiance Meng, Mangui Liang
doaj +1 more source
Survey of network-layer anonymous communication protocols
An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding, content encryption, and traffic obfuscation to hide communication relationships between ...
WANG Liangmin, NI Xiaoling, ZHAO Hui
doaj +3 more sources
Anonymous Networking Amidst Eavesdroppers [PDF]
The problem of security against timing based traffic analysis in wireless networks is considered in this work. An analytical measure of anonymity in eavesdropped networks is proposed using the information theoretic concept of equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are ...
Venkitasubramaniam, Parvathinathan +2 more
openaire +2 more sources
Anonymous Meeting in Networks [PDF]
A team consisting of an unknown number of mobile agents, starting from different nodes of an unknown network, possibly at different times, have to meet at the same node. Agents are anonymous (identical), execute the same deterministic algorithm and move in synchronous rounds along links of the network.
Dieudonné, Yoann, Pelc, Andrzej
openaire +3 more sources
Survey of anonymous communication system
Anonymous communication system refers to a network that is built on the network application layer and combines data forwarding, content encryption, traffic obfuscation and other technologies to realize the association between communication entities and ...
Chen Huan +3 more
doaj +1 more source

