Book description
This book examines anonymous communication networks as a solution to Internet privacy concerns. It explores various anonymous communication networks as possible solutions to Internet privacy concerns and identifies specific scenarios where it is best to remain anonymous. The text details the two main approaches to anonymous communication networks: onion routing and mixed networks. Using examples and case studies, it illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It also includes guidance to help readers download and install Tor, I2P, JAP/JonDo, and QuickSilver.
Table of contents
- Front Cover
- Contents
- Chapter 1: Anonymity in Network Communication (1/3)
- Chapter 1: Anonymity in Network Communication (2/3)
- Chapter 1: Anonymity in Network Communication (3/3)
- Chapter 2: Mix Networks (1/10)
- Chapter 2: Mix Networks (2/10)
- Chapter 2: Mix Networks (3/10)
- Chapter 2: Mix Networks (4/10)
- Chapter 2: Mix Networks (5/10)
- Chapter 2: Mix Networks (6/10)
- Chapter 2: Mix Networks (7/10)
- Chapter 2: Mix Networks (8/10)
- Chapter 2: Mix Networks (9/10)
- Chapter 2: Mix Networks (10/10)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (1/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (2/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (3/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (4/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (5/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (6/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (7/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (8/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (9/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (10/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (11/11)
- Chapter 4: Onion Routing (1/5)
- Chapter 4: Onion Routing (2/5)
- Chapter 4: Onion Routing (3/5)
- Chapter 4: Onion Routing (4/5)
- Chapter 4: Onion Routing (5/5)
- Chapter 5: Optimisation and Practical Application of Onion Routing (1/6)
- Chapter 5: Optimisation and Practical Application of Onion Routing (2/6)
- Chapter 5: Optimisation and Practical Application of Onion Routing (3/6)
- Chapter 5: Optimisation and Practical Application of Onion Routing (4/6)
- Chapter 5: Optimisation and Practical Application of Onion Routing (5/6)
- Chapter 5: Optimisation and Practical Application of Onion Routing (6/6)
- Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (1/4)
- Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (2/4)
- Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (3/4)
- Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (4/4)
- References (1/2)
- References (2/2)
Product information
- Title: Anonymous Communication Networks
- Author(s):
- Release date: April 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781439881606
You might also like
book
P2P Networking and Applications
Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text …
book
Internet Searches for Vetting, Investigations, and Open-Source Intelligence
In the information age, it is critical that we understand the implications and exposure of the …
book
CompTIA® Network+® Study Guide, Second Edition
Todd Lammle's CompTIA Network+ Authorized Study Guide for the N10-005 exam! CompTIA's Network+ certification tells the …
book
We Have Root
A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, …