Results 21 to 30 of about 6,802 (157)

I2P’s Usage Characterization [PDF]

open access: yes, 2012
We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and show through three one-week measurement experiments the ability of the system to identify a significant number of all running ...
Timpanaro, Juan Pablo   +2 more
openaire   +2 more sources

A Secure Anonymous Identity‐Based Virtual‐Space Agreement Method for Crowds‐Based Anonymous Communicate Scheme

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
Anonymous data exchange is in great demand in many situations, especially in remote control systems, in which a stable, secure, and secret data channel must be established between the controlling and controlled parties to distribute control commands and return data. In the previous work, we built a two‐level Virtual-Space anonymous communication scheme
Kai Lin   +4 more
wiley   +1 more source

Autocriticismo como mediador entre o stress de infertilidade e a sintomatologia ansiosa e depressiva em mulheres

open access: yesRevista Portuguesa de Investigação Comportamental e Social, 2023
Objetivo: Explorar o papel mediador do autocriticismo na relação entre o stress da infertilidade e a sintomatologia ansiosa e depressiva em mulheres diagnosticadas com infertilidade ou a tentar conceber há mais de um ano.
Micaela Alves   +2 more
doaj   +1 more source

Average and statistical properties of coherent radiation from steady‐state microbunching

open access: yesJournal of Synchrotron Radiation, Volume 30, Issue 1, Page 35-50, January 2023., 2023
The radiation properties of a novel high‐power accelerator light source are presented. Potential applications include high‐resolution angle‐resolved photoemission spectroscopy and extreme ultraviolet lithography.A promising accelerator light source mechanism called steady‐state microbunching (SSMB) is being actively studied.
X. J. Deng   +9 more
wiley   +1 more source

A Novel Image Cryptosystem Inspired by the Generation of Biological Protein Sequences

open access: yesIEEE Access, 2023
Image encryption is essential to keep images secure either in personal devices or over the cloud drives. Various robust image cryptosystems have been implemented during the past decades to keep the encrypted images far from illegal decryption by ...
Mohammad Nassef   +2 more
doaj   +1 more source

I2P Forensic Analysis

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2020
I2P is an anonymous P2P distributed communication layer used to send messages to each other anonymously and safely. It is built on top of the internet and can be considered as an internet within the internet. Even though I2P is developed with an intention to create censorship resistant environment for the free flow of information, it is misused for ...
Sneha Soney*   +3 more
openaire   +1 more source

Photonic‐plasmonic hot‐electron‐based photodetection with diffracted‐order‐resolved leaky plasmonic mechanisms

open access: yesNanophotonics, Volume 11, Issue 19, Page 4439-4453, September 2022., 2022
Abstract Although hot‐carrier‐based photodetection using plasmonic effects has been widely investigated, photodetectors of this type with an external quantum efficiency (EQE) >1% and an active area of <1 mm2 remain out of reach even in the visible frequencies.
Yin‐Jung Chang   +2 more
wiley   +1 more source

The Anonymity of the Dark Web: A Survey

open access: yesIEEE Access, 2022
The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned ...
Javeriah Saleem   +2 more
doaj   +1 more source

A Covert‐Aware Anonymous Communication Network for Social Communication

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
To effectively protect the communication content and communication behavior of social networks, anonymous communication technologies are widely used. However, the anonymous communication networks represented by Tor and I2P lack the covertness of the control plane design, which leads to important user behavioral characteristics in the process of ...
Xinda Cheng   +6 more
wiley   +1 more source

Characterization of Immunogenicity of Malignant Cells with Stemness in Intrahepatic Cholangiocarcinoma by Single‐Cell RNA Sequencing

open access: yesStem Cells International, Volume 2022, Issue 1, 2022., 2022
Cancer stem cells (CSCs) are responsible for long‐term maintenance of tumors and thought to play a role in treatment resistance. The interaction between stemness and immunogenicity of CSCs in the intrahepatic cholangiocarcinoma (iCCA) is largely unknown.
Jing Bian   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy