Results 1 to 10 of about 6,802 (157)

The dark side of I2P, a forensic analysis case study [PDF]

open access: yesSystems Science & Control Engineering, 2017
File sharing applications, which operate as a form of Peer-to-Peer (P2P) network, are popular amongst users and developers due to their heterogeneity, decentralized approach and rudimentary deployment features.
Behnam Bazli   +2 more
doaj   +4 more sources

Forensic analysis of I2P activities [PDF]

open access: yes2016 22nd International Conference on Automation and Computing (ICAC), 2016
File sharing applications that operate as form of peer-to-peer (P2P) networks have been popular amongst users and developers for their heterogeneity and easy deployments features. However, they have been used for illegal activities online.
BAZLI, Behnam
core   +4 more sources

Three stream fusion network with color aware transformer for image to point cloud registration [PDF]

open access: yesScientific Reports
Driven by the advancements in artificial intelligence technologies, image-to-point-cloud registration (I2P) have made significant strides. Nevertheless, the dimensional differences in the features of points cloud and image continue to pose considerable ...
Muyao Peng   +4 more
doaj   +2 more sources

Mapping the invisible internet: Framework and datasetZenodo [PDF]

open access: yesData in Brief
This article describes a novel dataset that maps the network layer of the Invisible Internet Project (I2P). The data was collected using SWARM-I2P framework, which deployed I2P routers as a network of mapping agents that gather information on the network'
Siddique Abubakr Muntaka   +6 more
doaj   +2 more sources

Comparative study of anonymous network Tor and I2P

open access: yes网络与信息安全学报, 2019
Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The ...
Yun YANG, Lingyan LI, Qingzheng WEI
doaj   +5 more sources

A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2022
Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide ...
M. Hosseini Shirvani, A. Akbarifar
doaj   +2 more sources

MAC-I2P: I2P Registration with Modality Approximation and Cone–Block–Point Matching

open access: yesApplied Sciences
The misaligned geometric representation between images and point clouds and the different data densities limit the performance of I2P registration.
Yunda Sun, Lin Zhang, Shengjie Zhao
doaj   +2 more sources

An Empirical Study of the I2P Anonymity Network and its Censorship Resistance [PDF]

open access: yesProceedings of the Internet Measurement Conference 2018, 2018
Tor and I2P are well-known anonymity networks used by many individuals to protect their online privacy and anonymity. Tor's centralized directory services facilitate the understanding of the Tor network, as well as the measurement and visualization of ...
Choffnes David   +18 more
core   +2 more sources

Examining Sexual Well-being across the Lifespan: Assessing the Relationship between Sexual Satisfaction and Adjustment to Aging [PDF]

open access: yesEuropean Psychiatry
Introduction Sexual satisfaction is relevant to aging well, throughout the lifespan. Objectives This study aims to compare the perspectives of sexual satisfaction and adjustment to aging in three age cohorts, across the life span; and to analyze ...
I. Miguel, S. von Humboldt, I. Leal
doaj   +2 more sources

Deciding Your Own Anonymity: User-Oriented Node Selection in I2P

open access: yesIEEE Access, 2018
With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong anonymity through its ...
Lin Ye   +5 more
doaj   +4 more sources

Home - About - Disclaimer - Privacy