Anonymous Networking Amidst Eavesdroppers

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

gap - Practical Anonymous Networking

This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based ...

متن کامل

A Rate-Distortion Approach to Anonymous Networking

The problem of hiding data routes in a wireless network from eavesdroppers is considered. Using Shannon’s equivocation as a measure of anonymity of routes, scheduling and relaying protocols are designed to guarantee anonymity. A duality of this problem to information-theoretic rate-distortion is used to maximize network throughput for any specified level of anonymity. The achievability of this ...

متن کامل

ANDaNA: Anonymous Named Data Networking Application

Content-centric networking — also known as information-centric networking (ICN) — shifts emphasis from hosts and interfaces (as in today’s Internet) to data. Named data becomes addressable and routable, while locations that currently store that data become irrelevant to applications. Named Data Networking (NDN) is a large collaborative research effort that exemplifies the content-centric approa...

متن کامل

Evaluating Anonymous Social Networking for HIV Patients with Social Prototypes

Socialization is an important conduit of information, and particularly so in developing countries. Ironically, People Living with HIV/ AIDS (PLHA) avoid socialisation among themselves as well as among others because of stigma. We describe a unique Anonymous Social Networking (ASN) product for PLHA called “Sangam” that uses an Interactive Voice Response System (IVRS). We evaluated our design by ...

متن کامل

Proving Group Protocols Secure Against Eavesdroppers

Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate automated verification of a particular type of security protocols, called group protocols, in the presence of an eavesdropper, i.e., a passive attacker. The specificity of group protocols is that the number of partici...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2008

ISSN: 0018-9448

DOI: 10.1109/tit.2008.921660