I2P

Results: 37



#Item
11

I2P’s Usage Characterization Juan Pablo Timpanaro, Isabelle Chrisment*, Olivier Festor INRIA Nancy-Grand Est, France *LORIA - ESIAL, Henri Poincar´e University, Nancy 1, France Abstract. We present the first monitori

Add to Reading List

Source URL: tma2012.ftw.at

Language: English
    12Internet privacy / Cross-platform software / Online chat / File sharing networks / Distributed computing architecture / Freenet / I2P / Peer-to-peer / Internet Relay Chat / Computing / Software / Internet

    Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

    Add to Reading List

    Source URL: www.ohmygodel.com

    Language: English - Date: 2012-05-12 17:14:46
    13Internet / Tor / Onion routing / Traffic analysis / Relay / Proxy server / Computer insecurity / Freenet / I2P / Software / Internet privacy / Computing

    Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2013-03-07 16:53:15
    14Cryptography / Onion routing / Tor / Anonymous remailer / Proxy server / Anonymizer / Differential privacy / I2P / Information privacy / Internet privacy / Computing / Software

    PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks ∗ Tariq Elahi

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2014-09-02 12:21:07
    15Distributed data storage / Internet privacy / Cross-platform software / I2P / Kademlia / Computer networking / GNUnet / Kad network / Peer-to-peer / Software / Computing / File sharing networks

    PDF Document

    Add to Reading List

    Source URL: www.syssec-project.eu

    Language: English - Date: 2011-07-25 05:22:45
    16Internet / Electronic commerce / Secure communication / Transport Layer Security / Server / Transparent Data Encryption / Encrypting File System / I2P / Computing / Software / Internet standards

    Client Accessible Encrypted Server Storage By combining SSL and Transparent Data Encryption technologies into client-server type architecture we are able to create an encrypted data storage and messaging solution. Simpli

    Add to Reading List

    Source URL: www.cryptoheaven.com

    Language: English - Date: 2011-03-01 12:37:51
    17Internet / Tor / Email / Anonymity / ANts P2P / Traffic analysis / Anonymous web browsing / Onion routing / I2P / Internet privacy / Software / Computing

    Tor: Anonymous Internet communication Steven J. Murdoch Computer Laboratory Security Group

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2013-09-24 13:58:53
    18Cryptography / Onion routing / Tor / Proxy server / Anonymous remailer / David Chaum / Anonymous web browsing / Mix network / I2P / Internet privacy / Computing / Internet

    Communication Privacy and Censorship Resistance Vitaly Shmatikov Privacy on Public Networks • Internet is designed as a public network

    Add to Reading List

    Source URL: www.sti.uniurb.it

    Language: English - Date: 2014-09-11 02:41:52
    19Internet privacy / File sharing networks / Routing / Internet television / Tribler / Tor / I2P / Onion routing / HTTP / Computing / Concurrent computing / Software

    . Anonymous Internet Anonymizing peer-to-peer traffic using applied cryptography.

    Add to Reading List

    Source URL: repository.tudelft.nl

    Language: English
    20Internet / Webmail / Mail / Secure messaging / I2P / Email / Computer-mediated communication / Computing

    IncaMail Confidential and verifiable e-mailing. Powered by

    Add to Reading List

    Source URL: www.post.ch

    Language: English
    UPDATE