Results 1 to 10 of about 496,765 (185)
Anonymity for Practical Quantum Networks [PDF]
5 pages, published ...
Unnikrishnan, Anupama +5 more
openaire +4 more sources
Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network
With the rise of the internet, there has been an increasing focus on user anonymity. Anonymous communication networks (ACNs) aim to protect the identity privacy of users in the network.
Xiance Meng, Mangui Liang
doaj +3 more sources
Secure Anonymous Conferencing in Quantum Networks
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement—making their identities publicly known. In certain circumstances, however, communicating users demand anonymity.
Federico Grasselli +6 more
doaj +3 more sources
A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison [PDF]
Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide ...
M. Hosseini Shirvani, A. Akbarifar
doaj +1 more source
Anonymous conference key agreement in linear quantum networks [PDF]
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA) - an extension of key distribution to multiple parties - has received much attention ...
Jarn de Jong +4 more
doaj +1 more source
Anonymous Networking Amidst Eavesdroppers [PDF]
The problem of security against timing based traffic analysis in wireless networks is considered in this work. An analytical measure of anonymity in eavesdropped networks is proposed using the information theoretic concept of equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are ...
Venkitasubramaniam, Parvathinathan +2 more
openaire +2 more sources
Anonymous Meeting in Networks [PDF]
A team consisting of an unknown number of mobile agents, starting from different nodes of an unknown network, possibly at different times, have to meet at the same node. Agents are anonymous (identical), execute the same deterministic algorithm and move in synchronous rounds along links of the network.
Dieudonné, Yoann, Pelc, Andrzej
openaire +3 more sources
FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks
Anonymous technology is an effective way for protecting users’ privacy. Anonymity in sensor networks is to prevent the unauthorized third party from revealing the identities of the communication parties.
Fengyin Li +5 more
doaj +1 more source
Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks
We consider the limits of privacy based on the knowledge of interactions in anonymous networks. In many anonymous networks, such as blockchain cryptocurrencies, dark web message boards, and other illicit networks, nodes are anonymous to outsiders ...
Louis M. Shekhtman +2 more
doaj +1 more source
Comparative study of anonymous network Tor and I2P
Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The ...
Yun YANG, Lingyan LI, Qingzheng WEI
doaj +3 more sources

