Deciding Your Own Anonymity: User-Oriented Node Selection in I2P
With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong anonymity through its encryption and communication schemes. However, I2P doe...
Main Authors: | Lin Ye, Xiangzhan Yu, Junda Zhao, Dongyang Zhan, Xiaojiang Du, Mohsen Guizani |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8537903/ |
Similar Items
-
Tor network anonymity evaluation based on node anonymity
by: Jun Cui, et al.
Published: (2023-11-01) -
Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network
by: Xiance Meng, et al.
Published: (2023-10-01) -
AnoA: A Framework for Analyzing Anonymous Communication Protocols
by: Michael Backes, et al.
Published: (2017-01-01) -
Secure and Anonymous Communications Over Delay Tolerant Networks
by: Spiridon Bakiras, et al.
Published: (2020-01-01) -
Exploiting Online Services to Enable Anonymous and Confidential Messaging
by: Pedro Sousa, et al.
Published: (2022-08-01)