Proof of storage with corruption identification and recovery for dynamic group users Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA. Chinese Journal of Network and Information Security, 2023, 9(1): 103-114. Physical-social attributes integrated Sybil detection for Tor bridge distribution Xin SHI, Yunfei GUO, Yawen WANG, Xiaoli SUN, Hao LIANG. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80.ĭynamic multi-keyword searchable encryption scheme Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG.ĭistributed user privacy preserving adjustable personalized QoS prediction model for cloud services Chinese Journal of Network and Information Security, 2023, 9(3): 73-78. Research on credit card transaction security supervision based on PU learning Analysis of multilayer-encryption anonymity networks. A longitudinal analysis of I2P leakage in the public DNS infrastructure// 2016 Conference on ACM SIGCOMM. International Journal of Applied Engineering Research, 2014,9(20): 7333-7345. A comprehensive behavior analysis of Tor versus I2P. KARTHIGEYAN A, ROBINSON J M, MANIKANDAN S P ,et al. Privacy implications of performance-based peer selection by onion routers:a real-world case study using I2P// 11th Privacy Enhancing Technologies Symposium (PETS 2011). Privacy-implications of performance-based peer selection by onion-routers:a real-world case study using I2P. A comprehensive behavior analysis of Tor versus I2P// International Journal of Applied Engineering Research, 2014,9(20): 7333-7345. TOR vs I2P:a comparative Study// 2016 IEEE International Conference on Industrial Technology (ICIT). Evaluation of the anonymous I2P network’s design choices against performance and security// The 1st International Conference on Information Systems Security and Privacy(ICISSP 2015). TIMPANARO J P, CHOLEZ T, CHRISMENT I ,et al. Proceedings on Privacy Enhancing Technologies, 2016(4): 454-459. Selfrando:securing the Tor browser against de-anonymization exploits. School of Computer Science &Engineering, 2015.ĬONTI M, CRANE S, FRASSETTO T ,et al. Research on the Analysis of I2P anonymous communication protocol and flow identification. Shanghai:Shanghai Jiaotong University, 2012. Uniform distribution routing algorithm based on Tor network. Research on anymous communication based on Tor. Evaluation of the anonymous I2P network's design choices against performance and security// The 1st International Conference on Information Systems Security and Privacy (ICISSP 2015). Optimization and implementation of I2P anonymous communication system. A survey on Tor and I2P// The 9th International Conference on Internet Monitoring and Protection (ICIMP 2014). Journal of Computer Research and Development, 2014,51(7): 1538-1546.ĬONRAD B, SHIRAZI F. A Tor anonymous communication system with security enhancements. Weighted factors for measuring anonymity services:a case study on Tor,jondonym,and I2P. Key words: anonymous network, Tor, I2P, onion routing, garlic routing Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The anonymous network Tor and I2P have been highly valued by the academic community and the industry,and are also welcomed by users.The key difference between the design concept between the Tor network and the I2P is that I2P attempts to transfer the existing Internet service to the I2P network,and service implementation is provided within the framework,while Thor allows anonymous access to implement and operate external Internet services separately.The anonymous networks Tor and I2P in terms of terminology,project development,anonymous services,key technologies,threat types,etc.were compared,revealing the inherent and essential differences between the two anonymous networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |