Systematic literature review on the state of the art and future research work in anonymous communications systems

MA Nia, A Ruiz-Martinez - Computers & electrical engineering, 2018 - Elsevier
Privacy is an important research topic due to its implications in society. Among the topics
covered by privacy, we can highlight how to establish anonymous communications. During …

Anonymity and closely related terms in the cyberspace: An analysis by example

G Kambourakis - Journal of information security and applications, 2014 - Elsevier
Anonymity is generally conceived to be an integral part of user's right to privacy. Without
anonymity, many online activities would become prone to eavesdropping, making them …

Securing offline delivery services by using Kerberos authentication

H Li, Y Niu, J Yi, H Li - Ieee Access, 2018 - ieeexplore.ieee.org
With the rise of crowdsourcing economies, the home delivery business is now undergoing
rapid development. The authentication schemes that are currently used in the home delivery …

Providing efficient SSO to cloud service access in AAA-based identity federations

AP Méndez, RM López, GL Millán - Future Generation Computer Systems, 2016 - Elsevier
The inclusion of cloud services within existing identity federations has gained interest in the
last years, as a way to simplify the access to them, reducing the user management costs …

Towards the integration of reputation management in OpenID

GD Tormo, FG Mármol, GM Pérez - Computer Standards & Interfaces, 2014 - Elsevier
OpenID is an open standard providing a decentralized authentication mechanism to end
users. It is based on a unique URL (Uniform Resource Locator) or XRI (Extensible Resource …

Complete SIP message obfuscation: PrivaSIP over Tor

G Karopoulos, A Fakis… - 2014 Ninth International …, 2014 - ieeexplore.ieee.org
Anonymity on SIP signaling can be achieved either by the construction of a lower level
tunnel (via the use of SSL or IPSec protocols) or by employing a custom-tailored solution …

Analytical survey of existing research on anonymous communication technologies and directions for further study

MA Nia, A Ruiz-Martínez - International Journal of …, 2022 - search.proquest.com
Privacy is an important research topic due to its implications in society. Among the topics
covered by privacy, we can highlight how to establish anonymous communications. Dur-ing …

Ζητήματα προστασίας της ανωνυμίας τελικού χρήστη σε υπηρεσίες VoIP

Α Φακής - 2023 - hellanicus.lib.aegean.gr
Με την εξάπλωση του Διαδικτύου υψηλών ταχυτήτων σε συνδυασμό με τις σύγχρονες γενιές
κυψελωτών δικτύων επικοινωνιών, το πρωτόκολλο SIP αποτελεί βασική συνιστώσα για την …

基于PAC 的Kerberos 认证授权机制研究与改进

元智博, 王慧丽, 张健, 池亚平 - 北京电子科技学院学报, 2015 - cqvip.com
Kerberos 是在开放网络环境中广泛使用的安全认证协议. 近年来. 对Kerberos
协议的研究大多集中于如何提高其认证流程的安全性. 本文在对Kerberos 协议原有理论及流程 …

Multiprotocol Authentication Device for HPC and Cloud Environments Based on Elliptic Curve Cryptography

AF Díaz García, I Blokhin, M Anguita López… - 2020 - digibug.ugr.es
Multifactor authentication is a relevant tool in securing IT infrastructures combining two or
more credentials. We can find smartcards and hardware tokens to leverage the …