Zobrazeno 1 - 10
of 551
pro vyhledávání: '"Onion routing"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-12 (2024)
Abstract Timed-release encryption (TRE) is a cryptographic primitive that can control the decryption time and has significant application value in time-sensitive scenarios. To solve the reliability issue of nodes in existing TRE anonymous interaction
Externí odkaz:
https://doaj.org/article/09c07fca0450439da84bea181b160391
Autor:
Nilesh Kumar Jadav, Riya Kakkar, Harsh Mankodiya, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal, Ravi Sharma
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 2, Pp 422-435 (2023)
The rise of automation with Machine-Type Communication (MTC) holds great potential in developing Industrial Internet of Things (IIoT)-based applications such as smart cities, Intelligent Transportation Systems (ITS), supply chains, and smart industri
Externí odkaz:
https://doaj.org/article/e87382d091794eb099dac028b8f18405
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
WANG Lei, LI Xiao-yu
Publikováno v:
Jisuanji kexue, Vol 49, Iss 9, Pp 347-354 (2022)
In order to ensure the location privacy of mobile nodes when using location-based services,a mobile privacy protection scheme for location based service(LBS)based on random onion routing is proposed.This scheme integrates random onion routing and hyb
Externí odkaz:
https://doaj.org/article/3c44c74eac2a4d9cbfce90fea61bceff
Publikováno v:
SoftwareX, Vol 18, Iss , Pp 101067- (2022)
The Wireless Sensor Network (WSN) is a monitoring system consisting of a large number of wireless devices forming a multi-hop network without infrastructure. WSN nodes are generally cheap resource-constrained devices detecting environmental features
Externí odkaz:
https://doaj.org/article/edb4bc36c04d42f0b6d36b5ad70cd571
Publikováno v:
Tehnički Vjesnik, Vol 27, Iss 4, Pp 1115-1125 (2020)
Anonymous systems are usually used to protect users' privacy in network communication. However, even in the low-latency Tor system, it is accompanied by network communication performance degradation, which makes users have to give up using the anonym
Externí odkaz:
https://doaj.org/article/6983a40ce3434dce83102979c0bf7e92
Publikováno v:
IEEE Access, Vol 8, Pp 43001-43012 (2020)
Risks regarding Internet privacy and security have been identified as issues for both new and experienced users of Internet technology. This paper explores the privacy and security threats in centralized search engines and proposes a decentralized se
Externí odkaz:
https://doaj.org/article/c02bd8d8543f4c1ebaa38133fc157af0
Publikováno v:
网络与信息安全学报, Vol 5, Pp 66-77 (2019)
Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The ano
Externí odkaz:
https://doaj.org/article/57a08c89fd4347159c690bd9a2a1daf3
Publikováno v:
网络与信息安全学报, Vol 5, Iss 1, Pp 66-77 (2019)
Tor is the most deployed anonymous communication system, providing online anonymity and privacy protection, while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing. The
Externí odkaz:
https://doaj.org/article/d6a9e757f14840ae9138daf51a7864db
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.