Title of article :
Anonymity Leakage Reduction in Network Latency
Author/Authors :
Longy O. Anyanwu، نويسنده , , Jared Keengwe، نويسنده , , Gladys Arome، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2010
Pages :
10
From page :
19
To page :
28
Abstract :
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide usersʹ identity as to personal, source and destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency, thus, the minimization of anonymity leakage in network latency becomes critically salient. The purpose of this paper is to investigate network latency anonymity leaks, and propose practical techniques for their reduction. In this direction, we investigate the following technical question: what implementation techniques can be configured to truly reduce anonymity leaks using deployable systems. Here, an extension of the popular Tor security strategies and unique configuration of the popular network anonymity techniques (algorithms) for future implementation are presented.
Keywords :
Network security. Network anonymity loss reduction. Secure networks and communication. Anonymous communications
Journal title :
International Journal of Multimedia and Ubiquitous Engineering
Serial Year :
2010
Journal title :
International Journal of Multimedia and Ubiquitous Engineering
Record number :
657949
Link To Document :
بازگشت