Results 71 to 80 of about 7,184 (199)

WebRTC Swarms: Decentralized, Incentivized, and Privacy-Preserving Signaling with Designated Verifier Zero-Knowledge Authentication

open access: yesFuture Internet
Real-time peer-to-peer communication in web browsers typically relies on centralized signaling servers, creating single points of failure, privacy vulnerabilities, and censorship risks.
Rafał Skowroński
doaj   +1 more source

A novel water‐soluble near‐infrared fluorescent probe for monitoring viscosity fluctuations in plants and zebrafish under abiotic stresses

open access: yesSmart Molecules, EarlyView.
HJA‐MQ‐D exhibits a rapid and sensitive response to viscosity changes based on the twisted intramolecular charge transfer mechanism. Displaying near‐infrared emission and excellent water‐solubility, enabling imaging at the cellular and whole plant level.
Yixue Feng   +9 more
wiley   +1 more source

New Information Components in the Formation of Electronic Evidence in Criminal Cases (the Modern Trail of Electronic-Digital Traces)

open access: yesСибирское юридическое обозрение
This work aims to examine the trace picture in cyberspace under contemporary conditions. The concept of a digital trail (in our treatment—electronic-digital) was proposed by V. B. Vekhov back in 2008 and refined in later publications.
A. B. Smushkin
doaj   +1 more source

Defending Tor from Network Adversaries: A Case Study of Network Path Prediction [PDF]

open access: yes, 2015
The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems and Internet exchanges, which can observe different overlay hops belonging to the same circuit.
Borisov, Nikita   +4 more
core   +2 more sources

International Tourism in the Global South: Revealing an Extractive Development Process

open access: yesThe Political Quarterly, EarlyView.
Abstract Hosting international tourism remains a key development strategy for many Global South countries to generate economic growth, government revenue and employment. However, this conventional wisdom can be contested: tourism may instead be seen as an extractive process that disrupts livelihoods, ecosystems and host economies.
Julia Jeyacheya, Mark P. Hampton
wiley   +1 more source

A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.0

open access: yesEgyptian Informatics Journal
Recently, the Internet of Things (IoT) has attracted different real-time services, predominantly in the healthcare domain. One such real-time IoT-based application is telesurgery, where surgeons remotely transmit surgery instructions to a robotic arm ...
Kavit Shah   +7 more
doaj   +1 more source

Practical and Provably Secure Onion Routing

open access: yes, 2017
In an onion routing protocol, messages travel through several intermediaries before arriving at their destinations, they are wrapped in layers of encryption (hence they are called "onions"). The goal is to make it hard to establish who sent the message. It is a practical and widespread tool for creating anonymous channels.
Ando, Megumi   +2 more
openaire   +4 more sources

The onion routing performance using shadow-plugin-TOR

open access: yes2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2017
Anonymous network provides user privacy to protect identity. The onion routing (TOR) project is one kind of Internet anonymous networks which attracts many researchers and clients nowadays, because of its simplicity and scalability. However, there are some difficulties to analyze TOR performance within live TOR networks since it is distributed and its ...
Hartanto Kusuma Wardana   +2 more
openaire   +2 more sources

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

Introducing Accountability to Anonymity Networks [PDF]

open access: yes, 2013
Many anonymous communication (AC) networks rely on routing traffic through proxy nodes to obfuscate the originator of the traffic. Without an accountability mechanism, exit proxy nodes risk sanctions by law enforcement if users commit illegal actions ...
Backes, Michael   +4 more
core  

Home - About - Disclaimer - Privacy