This study explains the structure of private internet systems and analyzes current anonymity technologies; proxy servers, remailers, JAP, Tor and I2P.
Privacy in communication has been an essential security requirement with the rapid growth of Internet. This has resulted in growing interest in methods for anonymous communication. Several system designs have been developed with the common aim of preserving communication privacy within the shared network environment. (Published abstract provided)
Similar Publications
- EVALUATING THE SUCCESS OF A KINETIC MODEL TO PREDICT CHROMATOGRAMS OF IGNITABLE LIQUIDS UNDER DIFFERENT EVAPORATION MODES AND IN THE PRESENCE OF PASSIVE-HEADSPACE EXTRACTION
- Data fusion from infrared, elemental, MSP and Raman for maximizing the efficiency of the forensic examination of paint evidence
- Extracting and Standardizing Medical Examiner Data to Improve Health