A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous system
The paper introduces a new collaborative technique for assuring data integrity while avoiding traffic analysis and other types of similar attacks (e.g., man-in-the-middle, data source fingerprinting, etc.). The new technique utilizes a quorum based approach to allow the client to validate the authen...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | |
| التنسيق: | article |
| منشور في: |
2015
|
| الوصول للمادة أونلاين: | http://hdl.handle.net/10725/5132 http://dx.doi.org/10.1016/j.chb.2014.09.031 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://ac.els-cdn.com/S074756321400483X/1-s2.0-S074756321400483X-main.pdf?_tid=a1e09394-e852-11e6-b638-00000aab0f6c&acdnat=1485935408_366c8e33e206dcbb11a737916f518f37 |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
الانترنت
http://hdl.handle.net/10725/5132http://dx.doi.org/10.1016/j.chb.2014.09.031
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://ac.els-cdn.com/S074756321400483X/1-s2.0-S074756321400483X-main.pdf?_tid=a1e09394-e852-11e6-b638-00000aab0f6c&acdnat=1485935408_366c8e33e206dcbb11a737916f518f37