[PDF][PDF] Comparison of anonymous communication networks-tor, I2P, Freenet

N Negi - International Research Journal of Engineering and …, 2017 - academia.edu
In the past few years, revelations made my some secret organizations around the world has
given rise to an interest in anonymous communication in order to protect the identity of the …

[PDF][PDF] A New Look at the Tor Anonymous Communication System

I Ahmad, M Saddique, U Pirzada, M Zohaib… - Journal of Digital …, 2018 - dline.info
Whenever a user tries communicating with another recipient on the Internet, vibrant
information is sent over different networks until the information is intercepted or normally …

[PDF][PDF] A Systematic Review of Anonymous Communication Systems.

RA Haraty, M Assi, I Rahal - ICEIS (2), 2017 - scitepress.org
Privacy and anonymity are important concepts in the field of communication. Internet users
seek to adopt protective measures to ensure the privacy and security of the data transmitted …

TOR vs I2P: A comparative study

A Ali, M Khan, M Saddique, U Pirzada… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
The Internet is the main source of communication now-a-days; however, the identities of
senders and receivers are not hidden. If someone wants to hide his/her identity, the most …

Anonymous communication and its importance in social networking

NP Hoang, D Pishva - 16th international conference on …, 2014 - ieeexplore.ieee.org
Digital information has become a social infrastructure and with the expansion of the Internet,
network infrastructure has become an indispensable part of social life and industrial activity …

Research on anonymous network topology analysis

S Kang - … Conference on Automation, Mechanical Control and …, 2015 - atlantis-press.com
In response to protect the privacy of Internet users, a variety of privacy enhancing
technologies (PETs) have emerged. As one of privacy enhancing technologies, anonymous …

Towards a taxonomy of wired and wireless anonymous networks

D Kelly, R Raines, R Baldwin, B Mullins… - 2009 IEEE …, 2009 - ieeexplore.ieee.org
With the aim to preserve privacy over a communications network, a plethora of anonymous
protocols have been proposed along with many empirical investigations into specific …

Rivulet: An anonymous communication method based on group communication

D Inoue, T Matsumoto - IEICE transactions on fundamentals of …, 2002 - search.ieice.org
Anonymous communication essentially involves two difficulties; 1) How does the sender
send a message anonymously? 2) How does the receiver send a reply to the anonymous …

A comparative study on anonymizing networks: ToR, I2P, and riffle networks comparison

M Hosseini Shirvani, A Akbarifar - Journal of Electrical and Computer …, 2022 - jecei.sru.ac.ir
Background and Objectives: Among miscellaneous networks, onion-based routing network
technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and …

How to find hidden users: A survey of attacks on anonymity networks

E Erdin, C Zachor, MH Gunes - IEEE Communications Surveys …, 2015 - ieeexplore.ieee.org
Communication privacy has been a growing concern, particularly with the Internet becoming
a major hub of our daily interactions. Revelations of government tracking and corporate …