Results 1 to 10 of about 690,729 (282)

Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network

open access: yesSensors, 2023
With the rise of the internet, there has been an increasing focus on user anonymity. Anonymous communication networks (ACNs) aim to protect the identity privacy of users in the network.
Xiance Meng, Mangui Liang
doaj   +3 more sources

Anonymity for Practical Quantum Networks [PDF]

open access: yesPhysical Review Letters, 2019
5 pages, published ...
Unnikrishnan, Anupama   +5 more
openaire   +4 more sources

Tor network anonymity evaluation based on node anonymity

open access: yesCybersecurity, 2023
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based ...
Jun Cui   +3 more
doaj   +2 more sources

De-anonymizing Social Networks [PDF]

open access: yes2009 30th IEEE Symposium on Security and Privacy, 2009
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.
Narayanan, Arvind, Shmatikov, Vitaly
openaire   +4 more sources

Anonymous traffic classification based on three-dimensional Markov image and deep learning [PDF]

open access: yesBulletin of the Polish Academy of Sciences: Technical Sciences, 2023
Illegal elements use the characteristics of an anonymous network hidden service mechanism to build a dark network and conduct various illegal activities, which brings a serious challenge to network security.
Xin Tang   +5 more
doaj   +1 more source

A Traffic Splitting Algorithm for Load Balancing in Tor

open access: yesEntropy, 2022
As the most popular anonymous communication system, Tor provides anonymous protection for users by sending their messages through a series of relays. Due to the use of the bandwidth-weighted path selection algorithm, many more users choose routers with ...
Xiance Meng, Mangui Liang
doaj   +1 more source

Survey of network-layer anonymous communication protocols

open access: yes网络与信息安全学报, 2020
An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding, content encryption, and traffic obfuscation to hide communication relationships between ...
WANG Liangmin, NI Xiaoling, ZHAO Hui
doaj   +3 more sources

Anonymous Networking Amidst Eavesdroppers [PDF]

open access: yesIEEE Transactions on Information Theory, 2008
The problem of security against timing based traffic analysis in wireless networks is considered in this work. An analytical measure of anonymity in eavesdropped networks is proposed using the information theoretic concept of equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are ...
Venkitasubramaniam, Parvathinathan   +2 more
openaire   +2 more sources

Anonymous Meeting in Networks [PDF]

open access: yesAlgorithmica, 2013
A team consisting of an unknown number of mobile agents, starting from different nodes of an unknown network, possibly at different times, have to meet at the same node. Agents are anonymous (identical), execute the same deterministic algorithm and move in synchronous rounds along links of the network.
Dieudonné, Yoann, Pelc, Andrzej
openaire   +3 more sources

Survey of anonymous communication system

open access: yesDianzi Jishu Yingyong, 2021
Anonymous communication system refers to a network that is built on the network application layer and combines data forwarding, content encryption, traffic obfuscation and other technologies to realize the association between communication entities and ...
Chen Huan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy