Results 11 to 20 of about 690,729 (282)

Comparative study of anonymous network Tor and I2P

open access: yes网络与信息安全学报, 2019
Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The ...
Yun YANG, Lingyan LI, Qingzheng WEI
doaj   +3 more sources

Temporal network embedding framework with causal anonymous walks representations [PDF]

open access: yesPeerJ Computer Science, 2022
Many tasks in graph machine learning, such as link prediction and node classification, are typically solved using representation learning. Each node or edge in the network is encoded via an embedding.
Ilya Makarov   +7 more
doaj   +2 more sources

VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning

open access: yesIEEE Access, 2021
Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number of network users applying different encryption techniques to network applications and services
Faiz Ul Islam   +3 more
doaj   +1 more source

Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks

open access: yesEPJ Data Science, 2023
We consider the limits of privacy based on the knowledge of interactions in anonymous networks. In many anonymous networks, such as blockchain cryptocurrencies, dark web message boards, and other illicit networks, nodes are anonymous to outsiders ...
Louis M. Shekhtman   +2 more
doaj   +1 more source

Anonymous network access using the digital marketplace [PDF]

open access: yes, 2007
With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important.
Irvine, J., McDiarmid, A.
core   +2 more sources

HORNET: High-speed Onion Routing at the Network Layer [PDF]

open access: yes, 2015
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range ...
Asoni, Daniele Enrico   +4 more
core   +2 more sources

A Survey of Privacy Protection and Network Security in User On-Demand Anonymous Communication

open access: yesIEEE Access, 2020
In an untrusted Internet environment, there is a large amount of user privacy information being vulnerable to various attacks, and it is an important security concern for users on how to protect their privacy, and to further provide the anonymity ...
Yun He   +4 more
doaj   +1 more source

Elections in Anonymous Networks

open access: yesInformation and Computation, 1994
AbstractWe address the problem of electing a leader in an anonymous, asynchronous network of arbitrary topology. Our algorithms are considerably simpler than known algorithms and have equal or improved communication complexity.
Afek, Y., Matias, Y.
openaire   +2 more sources

SACT: A New Model of Covert Communication Based on SDN

open access: yesSensors, 2020
Anonymous tracking technology of network watermarking is limited by the deployment of tracking devices in traditional network structure, resulting in poor scalability and reusability.
Leyi Shi   +4 more
doaj   +1 more source

Experimental anonymous conference key agreement using linear cluster states

open access: yesPhysical Review Research, 2023
Multipartite entanglement enables secure and anonymous key exchange between multiple parties in a network. Greenberger-Horne-Zeilinger states have been introduced as resource states for anonymous key exchange protocols, in which an anonymous subset of ...
Lukas Rückle   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy