Toward an analytical approach to anonymous wireless networking
نویسندگان
چکیده
منابع مشابه
A Rate-Distortion Approach to Anonymous Networking
The problem of hiding data routes in a wireless network from eavesdroppers is considered. Using Shannon’s equivocation as a measure of anonymity of routes, scheduling and relaying protocols are designed to guarantee anonymity. A duality of this problem to information-theoretic rate-distortion is used to maximize network throughput for any specified level of anonymity. The achievability of this ...
متن کاملAn Analytical Approach to Persian Gulf Architecture
Rehabiliating Bushehr historic fabric and paying to it as an important urban fabric through increasing capabilities and facilities is main concern. Bushehr historical fabric can be the consequence of several factors the most important of which is the Persian Gulf and its past history as a national one. This fabric, is organic, dense, compact, having its own characteristics. One of its main prio...
متن کاملAn Analytical Approach to Female Genital Mutilation in West Africa
Female genital mutilation in different parts of the African continent isconsidered as one of the vast territory’s social problems. This social problem whichis accounted as an old tradition in different countries of the African continent hashad so many unpleasant physical and mental effects on urban and rural Africanwomen during recent centuries. Throughout recent decades, considerable effortsha...
متن کاملgap - Practical Anonymous Networking
This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based ...
متن کاملAn Analytical Perspective to Traffic Engineering in Anonymous Communication Systems
Anonymous communication systems (ACS) offer privacy and anonymity through the Internet. They are mostly free tools and are popular among users all over the world. In the recent years, anonymity applications faced many problems regarding traffic engineering methods. Even though they ensure privacy under some conditions, their anonymity will be endangered by high performance processing units. To ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Magazine
سال: 2008
ISSN: 0163-6804
DOI: 10.1109/mcom.2008.4473096