Results 41 to 50 of about 6,802 (157)
Practical Attacks against the I2P Network [PDF]
Anonymity networks, such as Tor or I2P, were built to allow users to access network resources without revealing their identity. Newer designs, like I2P, run in a completely decentralized fashion, while older systems, like Tor, are built around central authorities.
Christoph Egger +3 more
openaire +1 more source
Noncommutative QED and Anomalous Dipole Moments [PDF]
We study QED on noncommutative spaces, NCQED. In particular we present the detailed calculation for the noncommutative electron-photon vertex and show that the Ward identity is satisfied.
Riad, I. F., Sheikh-Jabbari, M. M.
core +5 more sources
Web anonymization tools have been used for a long time, primarily by the users afraid of possible undesirable consequences of their on-line activity on the web.
Tomáš Sochor, Cyril Klimeš
doaj +1 more source
Mesoscopic persistent currents in a strong magnetic field [PDF]
Recent precision measurements of mesoscopic persistent currents in normal-metal rings rely on the interaction between the magnetic moment generated by the current and a large applied magnetic field.
Ania C. Bleszynski-Jayich +8 more
core +2 more sources
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a ...
Robert Bold +2 more
doaj +1 more source
$\epsilon$-Expansion in the Gross-Neveu Model from Conformal Field Theory [PDF]
We compute the anomalous dimensions of a class of operators of the form $(\bar\psi\psi)^p$ and $(\bar\psi\psi)^p\psi$ to leading order in $\epsilon$ in the Gross-Neveu model in $2+\epsilon$ dimensions. We use the techniques developed in arXiv: 1505.00963.
Ghosh, Sudip +3 more
core +2 more sources
Strong encryption algorithms and reliable anonymity routing have made cybercrime investigation more challenging. Hence, one option for law enforcement agencies (LEAs) is to search through unencrypted content on the Internet or anonymous communication ...
Jesper Bergman, Oliver B. Popov
doaj +1 more source
Double-electron ionization driven by inhomogeneous fields [PDF]
Authors may self-archive the author’s accepted manuscript of their articles on their own websites. Authors may also deposit this version of the article in any repository, provided it is only made publicly available 12 months after official publication or
Chacón, A. +7 more
core +3 more sources
BackgroundVirtual reality (VR) has shown promising levels of effectiveness in nursing education, pain management, and rehabilitation. However, meta-analyses have discussed the effects of VR usage in nursing unilaterally and inconsistently, and the ...
Yanjie Hu +6 more
doaj +1 more source
Superconformal hypermultiplets in superspace [PDF]
We use the manifestly N=2 supersymmetric, off-shell, harmonic (or twistor) superspace approach to solve the constraints implied by four-dimensional N=2 superconformal symmetry on the N=2 non-linear sigma-model target space, known as the special hyper-K ...
Acharya +55 more
core +2 more sources

