Results 1 to 10 of about 496,765 (185)

Anonymity for Practical Quantum Networks [PDF]

open access: yesPhysical Review Letters, 2019
5 pages, published ...
Unnikrishnan, Anupama   +5 more
openaire   +4 more sources

Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network

open access: yesSensors, 2023
With the rise of the internet, there has been an increasing focus on user anonymity. Anonymous communication networks (ACNs) aim to protect the identity privacy of users in the network.
Xiance Meng, Mangui Liang
doaj   +3 more sources

Secure Anonymous Conferencing in Quantum Networks

open access: yesPRX Quantum, 2022
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement—making their identities publicly known. In certain circumstances, however, communicating users demand anonymity.
Federico Grasselli   +6 more
doaj   +3 more sources

A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2022
Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide ...
M. Hosseini Shirvani, A. Akbarifar
doaj   +1 more source

Anonymous conference key agreement in linear quantum networks [PDF]

open access: yesQuantum, 2023
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA) - an extension of key distribution to multiple parties - has received much attention ...
Jarn de Jong   +4 more
doaj   +1 more source

Anonymous Networking Amidst Eavesdroppers [PDF]

open access: yesIEEE Transactions on Information Theory, 2008
The problem of security against timing based traffic analysis in wireless networks is considered in this work. An analytical measure of anonymity in eavesdropped networks is proposed using the information theoretic concept of equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are ...
Venkitasubramaniam, Parvathinathan   +2 more
openaire   +2 more sources

Anonymous Meeting in Networks [PDF]

open access: yesAlgorithmica, 2013
A team consisting of an unknown number of mobile agents, starting from different nodes of an unknown network, possibly at different times, have to meet at the same node. Agents are anonymous (identical), execute the same deterministic algorithm and move in synchronous rounds along links of the network.
Dieudonné, Yoann, Pelc, Andrzej
openaire   +3 more sources

FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks

open access: yesSensors, 2020
Anonymous technology is an effective way for protecting users’ privacy. Anonymity in sensor networks is to prevent the unauthorized third party from revealing the identities of the communication parties.
Fengyin Li   +5 more
doaj   +1 more source

Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks

open access: yesEPJ Data Science, 2023
We consider the limits of privacy based on the knowledge of interactions in anonymous networks. In many anonymous networks, such as blockchain cryptocurrencies, dark web message boards, and other illicit networks, nodes are anonymous to outsiders ...
Louis M. Shekhtman   +2 more
doaj   +1 more source

Comparative study of anonymous network Tor and I2P

open access: yes网络与信息安全学报, 2019
Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The ...
Yun YANG, Lingyan LI, Qingzheng WEI
doaj   +3 more sources

Home - About - Disclaimer - Privacy