Results 21 to 30 of about 6,802 (157)
I2P’s Usage Characterization [PDF]
We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and show through three one-week measurement experiments the ability of the system to identify a significant number of all running ...
Timpanaro, Juan Pablo +2 more
openaire +2 more sources
Anonymous data exchange is in great demand in many situations, especially in remote control systems, in which a stable, secure, and secret data channel must be established between the controlling and controlled parties to distribute control commands and return data. In the previous work, we built a two‐level Virtual-Space anonymous communication scheme
Kai Lin +4 more
wiley +1 more source
Objetivo: Explorar o papel mediador do autocriticismo na relação entre o stress da infertilidade e a sintomatologia ansiosa e depressiva em mulheres diagnosticadas com infertilidade ou a tentar conceber há mais de um ano.
Micaela Alves +2 more
doaj +1 more source
Average and statistical properties of coherent radiation from steady‐state microbunching
The radiation properties of a novel high‐power accelerator light source are presented. Potential applications include high‐resolution angle‐resolved photoemission spectroscopy and extreme ultraviolet lithography.A promising accelerator light source mechanism called steady‐state microbunching (SSMB) is being actively studied.
X. J. Deng +9 more
wiley +1 more source
A Novel Image Cryptosystem Inspired by the Generation of Biological Protein Sequences
Image encryption is essential to keep images secure either in personal devices or over the cloud drives. Various robust image cryptosystems have been implemented during the past decades to keep the encrypted images far from illegal decryption by ...
Mohammad Nassef +2 more
doaj +1 more source
I2P is an anonymous P2P distributed communication layer used to send messages to each other anonymously and safely. It is built on top of the internet and can be considered as an internet within the internet. Even though I2P is developed with an intention to create censorship resistant environment for the free flow of information, it is misused for ...
Sneha Soney* +3 more
openaire +1 more source
Abstract Although hot‐carrier‐based photodetection using plasmonic effects has been widely investigated, photodetectors of this type with an external quantum efficiency (EQE) >1% and an active area of <1 mm2 remain out of reach even in the visible frequencies.
Yin‐Jung Chang +2 more
wiley +1 more source
The Anonymity of the Dark Web: A Survey
The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned ...
Javeriah Saleem +2 more
doaj +1 more source
A Covert‐Aware Anonymous Communication Network for Social Communication
To effectively protect the communication content and communication behavior of social networks, anonymous communication technologies are widely used. However, the anonymous communication networks represented by Tor and I2P lack the covertness of the control plane design, which leads to important user behavioral characteristics in the process of ...
Xinda Cheng +6 more
wiley +1 more source
Cancer stem cells (CSCs) are responsible for long‐term maintenance of tumors and thought to play a role in treatment resistance. The interaction between stemness and immunogenicity of CSCs in the intrahepatic cholangiocarcinoma (iCCA) is largely unknown.
Jing Bian +8 more
wiley +1 more source

