Results 21 to 30 of about 7,184 (199)

Distributed Performance Measurement and Usability Assessment of the Tor Anonymization Network

open access: yesFuture Internet, 2012
While the Internet increasingly permeates everyday life of individuals around the world, it becomes crucial to prevent unauthorized collection and abuse of personalized information.
Steffen Kunz   +4 more
doaj   +1 more source

PPWSim: Privacy preserving wireless sensor network simulator

open access: yesSoftwareX, 2022
The Wireless Sensor Network (WSN) is a monitoring system consisting of a large number of wireless devices forming a multi-hop network without infrastructure.
Niki Hrovatin   +2 more
doaj   +1 more source

Provably Secure and Practical Onion Routing [PDF]

open access: yes2012 IEEE 25th Computer Security Foundations Symposium, 2012
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory, a comprehensive analysis of its security guarantees is still lacking.
Michael Backes   +3 more
openaire   +1 more source

Octopus: A Secure and Anonymous DHT Lookup [PDF]

open access: yes, 2012
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup ...
Borisov, Nikita, Wang, Qiyan
core   +1 more source

S-BAN: Secure Blockchain-Based Anonymous Networking Strategy for Privacy-Preserving DSM

open access: yesIEEE Access, 2023
Demand-side management (DSM) is an essential tool in smart power grids to enable efficient energy utilization. In DSM, customers send their fine-grained energy consumption data to the utility company (UC).
Mahmoud Abouyoussef, Muhammad Ismail
doaj   +1 more source

Guard Sets for Onion Routing

open access: yesProceedings on Privacy Enhancing Technologies, 2015
Abstract “Entry” guards protect the Tor onion routing system from variants of the “predecessor” attack, that would allow an adversary with control of a fraction of routers to eventually de-anonymize some users. Research has however shown the three guard scheme has drawbacks and Dingledine et al.
Danezis, G, Hayes, J
openaire   +2 more sources

DESMITIFICANDO A LA DEEP WEB A TRAVÉS DE UN FUGAZ VIAJE POR LA DARK WEB

open access: yesRevista Ingeniería, Matemáticas y Ciencias de la Información, 2021
At the moment when topics related to the Deep Web and the darkNets are treated, the imagination of the one who doesn’tknow it’s reality, is projected towards a gloomy environment of the Internet, with the setting of a CiberPunk anime film ofthe nineties;
John Alexander Rico Franco
doaj   +1 more source

A Formalization of Anonymity and Onion Routing [PDF]

open access: yes, 2004
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goals, such as privacy, has received less attention. Due to the increasing importance of privacy in the current society, formal methods will also become indispensable in this ...
Mauw, S.   +2 more
openaire   +2 more sources

Content and popularity analysis of Tor hidden services [PDF]

open access: yes, 2014
Tor hidden services allow running Internet services while protecting the location of the servers. Their main purpose is to enable freedom of speech even in situations in which powerful adversaries try to suppress it.
Biryukov, Alex   +3 more
core   +2 more sources

Secure and Anonymous Communications Over Delay Tolerant Networks

open access: yesIEEE Access, 2020
Today's society has a fundamental need for security and anonymity. Well suited, real-life scenarios such as whistleblower reports, intelligence service operations, and the ability to communicate within oppressive governments, call for such fundamental ...
Spiridon Bakiras   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy