Results 21 to 30 of about 7,184 (199)
Distributed Performance Measurement and Usability Assessment of the Tor Anonymization Network
While the Internet increasingly permeates everyday life of individuals around the world, it becomes crucial to prevent unauthorized collection and abuse of personalized information.
Steffen Kunz +4 more
doaj +1 more source
PPWSim: Privacy preserving wireless sensor network simulator
The Wireless Sensor Network (WSN) is a monitoring system consisting of a large number of wireless devices forming a multi-hop network without infrastructure.
Niki Hrovatin +2 more
doaj +1 more source
Provably Secure and Practical Onion Routing [PDF]
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory, a comprehensive analysis of its security guarantees is still lacking.
Michael Backes +3 more
openaire +1 more source
Octopus: A Secure and Anonymous DHT Lookup [PDF]
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup ...
Borisov, Nikita, Wang, Qiyan
core +1 more source
S-BAN: Secure Blockchain-Based Anonymous Networking Strategy for Privacy-Preserving DSM
Demand-side management (DSM) is an essential tool in smart power grids to enable efficient energy utilization. In DSM, customers send their fine-grained energy consumption data to the utility company (UC).
Mahmoud Abouyoussef, Muhammad Ismail
doaj +1 more source
Abstract “Entry” guards protect the Tor onion routing system from variants of the “predecessor” attack, that would allow an adversary with control of a fraction of routers to eventually de-anonymize some users. Research has however shown the three guard scheme has drawbacks and Dingledine et al.
Danezis, G, Hayes, J
openaire +2 more sources
DESMITIFICANDO A LA DEEP WEB A TRAVÉS DE UN FUGAZ VIAJE POR LA DARK WEB
At the moment when topics related to the Deep Web and the darkNets are treated, the imagination of the one who doesn’tknow it’s reality, is projected towards a gloomy environment of the Internet, with the setting of a CiberPunk anime film ofthe nineties;
John Alexander Rico Franco
doaj +1 more source
A Formalization of Anonymity and Onion Routing [PDF]
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goals, such as privacy, has received less attention. Due to the increasing importance of privacy in the current society, formal methods will also become indispensable in this ...
Mauw, S. +2 more
openaire +2 more sources
Content and popularity analysis of Tor hidden services [PDF]
Tor hidden services allow running Internet services while protecting the location of the servers. Their main purpose is to enable freedom of speech even in situations in which powerful adversaries try to suppress it.
Biryukov, Alex +3 more
core +2 more sources
Secure and Anonymous Communications Over Delay Tolerant Networks
Today's society has a fundamental need for security and anonymity. Well suited, real-life scenarios such as whistleblower reports, intelligence service operations, and the ability to communicate within oppressive governments, call for such fundamental ...
Spiridon Bakiras +3 more
doaj +1 more source

