OnionVPN: Onion Routing-Based VPN-Tunnels with Onion Services
Sebastian Pahl +3 more
openaire +1 more source
A Traffic Splitting Algorithm for Load Balancing in Tor. [PDF]
Meng X, Liang M.
europepmc +1 more source
Protein-Protein Interactions and Quantitative Phosphoproteomic Analysis Reveal Potential Mitochondrial Substrates of Protein Phosphatase 2A-B'ζ Holoenzyme. [PDF]
Elshobaky A +3 more
europepmc +1 more source
Cooperative Energy-Efficient Routing Protocol for Underwater Wireless Sensor Networks. [PDF]
Ahmad I +5 more
europepmc +1 more source
Wireless Sensor Networks for Precision Agriculture: A Review of NPK Sensor Implementations. [PDF]
Musa P, Sugeru H, Wibowo EP.
europepmc +1 more source
Enhancement of the performance of wireless sensor networks using the multihop multiantenna power beacon path selection method in intelligent structures. [PDF]
Hammad A, Mohamed MA, Abdel-Atty HM.
europepmc +1 more source
A Distance-Field-Based Pipe-Routing Method. [PDF]
Ueng SK, Huang HK.
europepmc +1 more source
Simulation on agent-based onion routing network
Security and anonymity are vital for some types of agent-based e-commerce applications. In order to provide secure and anonymous communication protection for multi-agent systems, we have developed an alternate Onion Routing approach based on agile agents under JADE multi-agent platform. In this paper, we present a simulation of the protocol and analyze
Song, Ronggong, Korba, Larry
openaire +1 more source
The onion routing (Tor) anonymous network, due to its multi-layer encryption and dynamic relay mechanisms, posed significant challenges for traffic classification. Illegal applications or websites traffic hidden within Tor anonymous network traffic could
CAO Qingwei +5 more
doaj
Analysis of the vulnerability estimation and neighbor value prediction in autonomous systems. [PDF]
Rahmatov N, Saeed F, Paul A.
europepmc +1 more source

