Results 31 to 40 of about 7,184 (199)

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

open access: yes, 2018
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.
Asoni, Daniele E.   +5 more
core   +1 more source

Cryptanalysis of a hybrid-structured onion routing scheme

open access: yesTongxin xuebao, 2013
SHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to ...
Long-hai LI   +3 more
doaj   +2 more sources

Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process

open access: yesEgyptian Informatics Journal, 2018
Among different types of network, Tor network is mostly referred as an onion-routing network which enables the anonymous communication and supports TCP applications over the network.
K. Sangeetha, K. Ravikumar
doaj   +1 more source

Key Management for Onion Routing in a True Peer to Peer Setting [PDF]

open access: yes, 2014
Onion routing is a technique for anonymous and privacy preserving communication at the base of popular Internet anonymity tools such as Tor. In onion routing, traffic is relayed by a number of intermediary nodes (called relays) before it reaches the ...
B.H. Bloom   +8 more
core   +2 more sources

Overview of Web Anonymization

open access: yesEuropean Journal of Business Science and Technology, 2017
Web anonymization tools have been used for a long time, primarily by the users afraid of possible undesirable consequences of their on-line activity on the web.
Tomáš Sochor, Cyril Klimeš
doaj   +1 more source

Portable Tor Router: Easily Enabling Web Privacy for Consumers

open access: yes, 2017
On-line privacy is of major public concern. Unfortunately, for the average consumer, there is no simple mechanism to browse the Internet privately on multiple devices. Most available Internet privacy mechanisms are either expensive, not readily available,
Barberis, Adrian   +3 more
core   +1 more source

End-to-End Privacy for Open Big Data Markets [PDF]

open access: yes, 2015
The idea of an open data market envisions the creation of a data trading model to facilitate exchange of data between different parties in the Internet of Things (IoT) domain.
Perera, Charith   +2 more
core   +3 more sources

Beyond Presumptions: Toward Mechanistic Clarity in Metal‐Free Carbon Catalysts for Electrochemical H2O2 Production via Data Science

open access: yesAdvanced Materials, EarlyView.
Metal‐free carbon catalysts enable the sustainable synthesis of hydrogen peroxide via two‐electron oxygen reduction; however, active site complexity continues to hinder reliable interpretation. This review critiques correlation‐based approaches and highlights the importance of orthogonal experimental designs, standardized catalyst passports ...
Dayu Zhu   +3 more
wiley   +1 more source

Seeking Anonymity in an Internet Panopticon

open access: yes, 2015
Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the ...
Feigenbaum, Joan, Ford, Bryan
core   +1 more source

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]

open access: yes, 2018
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy