Claessens et al., 1999 - Google Patents
Solutions for anonymous communication on the InternetClaessens et al., 1999
View PDF- Document ID
- 2590863198387281243
- Author
- Claessens J
- Preneel B
- Vandewalle J
- Publication year
- Publication venue
- Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No. 99CH36303)
External Links
Snippet
This paper gives a short overview on the currently existing technical solutions for anonymous communication. The problem of anonymous communication is defined, and its basic solution is described. Practical solutions, mostly based on the basic scheme, are …
- 238000004891 communication 0 title abstract description 29
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Claessens et al. | Solutions for anonymous communication on the Internet | |
Gritzalis | Enhancing web privacy and anonymity in the digital era | |
Reiter et al. | Anonymous web transactions with crowds | |
Goldberg | Privacy-enhancing technologies for the internet III: ten years later | |
Goldschlag et al. | Onion routing | |
Goldberg | A pseudonymous communications infrastructure for the internet | |
Claessens et al. | Revocable anonymous access to the Internet? | |
Muppidathi et al. | Creating Obstacles to Screened networks | |
Len et al. | Interoperability in end-to-end encrypted messaging | |
Syverson et al. | Private web browsing | |
Loesing et al. | Privacy-aware presence management in instant messaging systems | |
Oppliger | Privacy protection and anonymity services for the World Wide Web (WWW) | |
Kinateder et al. | Strong pseudonymous communication for peer-to-peer reputation systems | |
Yao et al. | A new k-anonymous message transmission protocol | |
Heydt-Benjamin et al. | Nonesuch: a mix network with sender unobservability | |
CA2328548A1 (en) | Privacy system | |
Ren et al. | Anonymous communication in overlay networks | |
Kavakli et al. | Addressing privacy: matching user requirements with implementation techniques | |
Rieke et al. | JANUS: Server anonymity in the world-wide web | |
Lopatic et al. | MMIP—Mixed Mobile Internet Protocol | |
Pfitzmann et al. | Communication privacy | |
Weiler et al. | Secure anonymous protocols for local and multicast environments | |
Elovici et al. | Anonymity Enhancing Technologies (AET) Opportunities and Threats | |
Landsiedel et al. | An Infrastructure for Anonymous Internet Services | |
Tatlı et al. | Dynamic anonymity |