Results 91 to 100 of about 7,184 (199)
Extending Tor to achieve recipient anonymity
Tor is a well-known routing protocol implementing the Onion multi-layered encryption to achieve communication anonymity. Among other possible attacks, Tor is vulnerable to passive attacks based on the compromise of multiple nodes, allowing the adversary ...
Francesco Buccafurri +2 more
doaj +1 more source
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network [PDF]
Traditionally, there are two methods to implement anonymous channels: free-route networks like onion routing and cascade networks like mix network. Each of them has its merits and is suitable for some certain applications of anonymous communication. Both of them have their own drawbacks, so neither of them can satisfy some applications.
Peng, Kun +3 more
openaire +2 more sources
A risk classification of registered pesticides in Brazil was conducted, and the contribution of food to cumulative pesticide exposure was evaluated. Model diets were proposed, based on Brazilian consumption patterns. Abstract BACKGROUND Pesticide residue exposure assessments can be carried out during both the pre‐regulation and post‐regulation phases ...
Bianca Figueiredo de Mendonça Pereira +1 more
wiley +1 more source
ABSTRACT The gill parasite Sparicotyle chrysophrii poses a significant threat to gilthead sea bream (Sparus aurata) aquaculture in the Mediterranean, causing considerable mortality and economic losses. As traditional chemotherapeutic treatments, like formalin, face growing regulatory restrictions, there is an urgent need for alternative control ...
Teresa Pirollo +8 more
wiley +1 more source
Effects of Carbon Nanoparticles on Triboelectro‐Induced Surface Defects
Carbon nanoparticles added to grease modify the electrocontact behavior. The synergy of particle concentration and electric current dominates the surface damage of metals in contact. Electrical surface damage caused by current leakage is a critical challenge in high‐performance applications such as electric vehicle (EV) drivetrains and wind turbine ...
Mohsen Tajedini +6 more
wiley +1 more source
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing ...
Fouad A. Yaseen +2 more
doaj +1 more source
Timed-release encryption anonymous interaction protocol based on smart contract
Timed-release encryption (TRE) is a cryptographic primitive that can control the decryption time and has significant application value in time-sensitive scenarios.
Ke Yuan +5 more
doaj +1 more source
Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network. [PDF]
Meng X, Liang M.
europepmc +1 more source
Anonymous Communication System based on Onion Routing
Communication is one of the most important medium through which people can share their intellectual and cultural beliefs. Communication with the help of computers is increasing at a rapid speed. Securing this communication is of prime importance to maintain user privacy and data confidentiality.
Dimple Bohra +3 more
openaire +1 more source
Onion Routing Key Distribution for QKDN
The advance of quantum computing poses a significant threat to classical cryptography, compromising the security of current encryption schemes such as RSA and ECC. In response to this challenge, two main approaches have emerged: quantum cryptography and post-quantum cryptography (PQC). However, both have implementation and security limitations. In this
Otero-García, Pedro +5 more
openaire +2 more sources

