Results 91 to 100 of about 7,184 (199)

Extending Tor to achieve recipient anonymity

open access: yesCybersecurity
Tor is a well-known routing protocol implementing the Onion multi-layered encryption to achieve communication anonymity. Among other possible attacks, Tor is vulnerable to passive attacks based on the compromise of multiple nodes, allowing the adversary ...
Francesco Buccafurri   +2 more
doaj   +1 more source

Klein Bottle Routing: An Alternative to Onion Routing and Mix Network [PDF]

open access: yes, 2006
Traditionally, there are two methods to implement anonymous channels: free-route networks like onion routing and cascade networks like mix network. Each of them has its merits and is suitable for some certain applications of anonymous communication. Both of them have their own drawbacks, so neither of them can satisfy some applications.
Peng, Kun   +3 more
openaire   +2 more sources

Pesticide prioritization based on risk and model diet proposals for assessing cumulative exposure to pesticide residues in the Brazilian population through food consumption

open access: yesPest Management Science, Volume 82, Issue 4, Page 3853-3873, April 2026.
A risk classification of registered pesticides in Brazil was conducted, and the contribution of food to cumulative pesticide exposure was evaluated. Model diets were proposed, based on Brazilian consumption patterns. Abstract BACKGROUND Pesticide residue exposure assessments can be carried out during both the pre‐regulation and post‐regulation phases ...
Bianca Figueiredo de Mendonça Pereira   +1 more
wiley   +1 more source

Looking for Greener Pastures: In Vitro Screening of Phytogenics for the Control of Sparicotyle chrysophrii in Gilthead Sea Bream

open access: yesJournal of Fish Diseases, Volume 49, Issue 4, April 2026.
ABSTRACT The gill parasite Sparicotyle chrysophrii poses a significant threat to gilthead sea bream (Sparus aurata) aquaculture in the Mediterranean, causing considerable mortality and economic losses. As traditional chemotherapeutic treatments, like formalin, face growing regulatory restrictions, there is an urgent need for alternative control ...
Teresa Pirollo   +8 more
wiley   +1 more source

Effects of Carbon Nanoparticles on Triboelectro‐Induced Surface Defects

open access: yesAdvanced Engineering Materials, Volume 28, Issue 6, 18 March 2026.
Carbon nanoparticles added to grease modify the electrocontact behavior. The synergy of particle concentration and electric current dominates the surface damage of metals in contact. Electrical surface damage caused by current leakage is a critical challenge in high‐performance applications such as electric vehicle (EV) drivetrains and wind turbine ...
Mohsen Tajedini   +6 more
wiley   +1 more source

ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management

open access: yesIEEE Access
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing ...
Fouad A. Yaseen   +2 more
doaj   +1 more source

Timed-release encryption anonymous interaction protocol based on smart contract

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Timed-release encryption (TRE) is a cryptographic primitive that can control the decryption time and has significant application value in time-sensitive scenarios.
Ke Yuan   +5 more
doaj   +1 more source

Anonymous Communication System based on Onion Routing

open access: yesInternational Journal of Computer Applications, 2015
Communication is one of the most important medium through which people can share their intellectual and cultural beliefs. Communication with the help of computers is increasing at a rapid speed. Securing this communication is of prime importance to maintain user privacy and data confidentiality.
Dimple Bohra   +3 more
openaire   +1 more source

Onion Routing Key Distribution for QKDN

open access: yes
The advance of quantum computing poses a significant threat to classical cryptography, compromising the security of current encryption schemes such as RSA and ECC. In response to this challenge, two main approaches have emerged: quantum cryptography and post-quantum cryptography (PQC). However, both have implementation and security limitations. In this
Otero-García, Pedro   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy