Results 11 to 20 of about 690,729 (282)
Comparative study of anonymous network Tor and I2P
Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The ...
Yun YANG, Lingyan LI, Qingzheng WEI
doaj +3 more sources
Temporal network embedding framework with causal anonymous walks representations [PDF]
Many tasks in graph machine learning, such as link prediction and node classification, are typically solved using representation learning. Each node or edge in the network is encoded via an embedding.
Ilya Makarov +7 more
doaj +2 more sources
VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning
Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number of network users applying different encryption techniques to network applications and services
Faiz Ul Islam +3 more
doaj +1 more source
Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks
We consider the limits of privacy based on the knowledge of interactions in anonymous networks. In many anonymous networks, such as blockchain cryptocurrencies, dark web message boards, and other illicit networks, nodes are anonymous to outsiders ...
Louis M. Shekhtman +2 more
doaj +1 more source
Anonymous network access using the digital marketplace [PDF]
With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important.
Irvine, J., McDiarmid, A.
core +2 more sources
HORNET: High-speed Onion Routing at the Network Layer [PDF]
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range ...
Asoni, Daniele Enrico +4 more
core +2 more sources
A Survey of Privacy Protection and Network Security in User On-Demand Anonymous Communication
In an untrusted Internet environment, there is a large amount of user privacy information being vulnerable to various attacks, and it is an important security concern for users on how to protect their privacy, and to further provide the anonymity ...
Yun He +4 more
doaj +1 more source
Elections in Anonymous Networks
AbstractWe address the problem of electing a leader in an anonymous, asynchronous network of arbitrary topology. Our algorithms are considerably simpler than known algorithms and have equal or improved communication complexity.
Afek, Y., Matias, Y.
openaire +2 more sources
SACT: A New Model of Covert Communication Based on SDN
Anonymous tracking technology of network watermarking is limited by the deployment of tracking devices in traditional network structure, resulting in poor scalability and reusability.
Leyi Shi +4 more
doaj +1 more source
Experimental anonymous conference key agreement using linear cluster states
Multipartite entanglement enables secure and anonymous key exchange between multiple parties in a network. Greenberger-Horne-Zeilinger states have been introduced as resource states for anonymous key exchange protocols, in which an anonymous subset of ...
Lukas Rückle +5 more
doaj +1 more source

