Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on routing in anonymous communication protocols
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …
communication platform that billions of users rely on for their daily activities. While this …
Low-cost traffic analysis of Tor
Tor is the second generation onion router supporting the anonymous transport of TCP
streams over the Internet. Its low latency makes it very suitable for common tasks, such as …
streams over the Internet. Its low latency makes it very suitable for common tasks, such as …
[PDF][PDF] A survey of solutions to the sybil attack
Many security mechanisms are based on specific assumptions of identity and are vulnerable
to attacks when these assumptions are violated. For example, impersonation is the well …
to attacks when these assumptions are violated. For example, impersonation is the well …
On the optimal placement of mix zones
In mobile wireless networks, third parties can track the location of mobile nodes by
monitoring the pseudonyms used for identification. A frequently proposed solution to protect …
monitoring the pseudonyms used for identification. A frequently proposed solution to protect …
A survey on mix networks and their secure applications
Anonymity is a subdiscipline of information hiding, required in a number of applications,
such as in electronic voting. For network communications, anonymity can be provided by a …
such as in electronic voting. For network communications, anonymity can be provided by a …
[PDF][PDF] The nym network
The Nym network (" Nym") is a decentralized and incentivized infrastructure to provision
privacy to a broad range of message-based applications and services. The core component …
privacy to a broad range of message-based applications and services. The core component …
Distributed ONS and its Impact on Privacy
B Fabian, O Gunther - 2007 IEEE International Conference on …, 2007 - ieeexplore.ieee.org
The EPC Network is an industry proposal to build a global information architecture for
objects carrying RFID tags with electronic product codes (EPC). A so-called object naming …
objects carrying RFID tags with electronic product codes (EPC). A so-called object naming …
Privacy-enhancing technologies
S Fischer-Hbner, S Berthold - Computer and information security …, 2017 - Elsevier
In our modern information age, recent technical developments and trends, such as mobile
and pervasive computing, big data, cloud computing, and Web 2.0 applications, increasingly …
and pervasive computing, big data, cloud computing, and Web 2.0 applications, increasingly …
Impact of network topology on anonymity and overhead in low-latency anonymity networks
Low-latency anonymous communication networks require padding to resist timing analysis
attacks, and dependent link padding has been proven to prevent these attacks with minimal …
attacks, and dependent link padding has been proven to prevent these attacks with minimal …
Performance comparison of low-latency anonymisation services from a user perspective
R Wendolsky, D Herrmann, H Federrath - Privacy Enhancing Technologies …, 2007 - Springer
Neither of the two anonymisation services Tor and AN. ON clearly outperforms the other one.
AN. ON's user-perceived QoS is generally more consistent over time than Tor's. While AN …
AN. ON's user-perceived QoS is generally more consistent over time than Tor's. While AN …