منابع مشابه
gap - Practical Anonymous Networking
This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based ...
متن کاملA Rate-Distortion Approach to Anonymous Networking
The problem of hiding data routes in a wireless network from eavesdroppers is considered. Using Shannon’s equivocation as a measure of anonymity of routes, scheduling and relaying protocols are designed to guarantee anonymity. A duality of this problem to information-theoretic rate-distortion is used to maximize network throughput for any specified level of anonymity. The achievability of this ...
متن کاملANDaNA: Anonymous Named Data Networking Application
Content-centric networking — also known as information-centric networking (ICN) — shifts emphasis from hosts and interfaces (as in today’s Internet) to data. Named data becomes addressable and routable, while locations that currently store that data become irrelevant to applications. Named Data Networking (NDN) is a large collaborative research effort that exemplifies the content-centric approa...
متن کاملEvaluating Anonymous Social Networking for HIV Patients with Social Prototypes
Socialization is an important conduit of information, and particularly so in developing countries. Ironically, People Living with HIV/ AIDS (PLHA) avoid socialisation among themselves as well as among others because of stigma. We describe a unique Anonymous Social Networking (ASN) product for PLHA called “Sangam” that uses an Interactive Voice Response System (IVRS). We evaluated our design by ...
متن کاملProving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate automated verification of a particular type of security protocols, called group protocols, in the presence of an eavesdropper, i.e., a passive attacker. The specificity of group protocols is that the number of partici...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2008
ISSN: 0018-9448
DOI: 10.1109/tit.2008.921660