Anonymous Communication Networks

Book description

In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Ano

Table of contents

  1. Front Cover
  2. Contents
  3. Chapter 1: Anonymity in Network Communication (1/3)
  4. Chapter 1: Anonymity in Network Communication (2/3)
  5. Chapter 1: Anonymity in Network Communication (3/3)
  6. Chapter 2: Mix Networks (1/10)
  7. Chapter 2: Mix Networks (2/10)
  8. Chapter 2: Mix Networks (3/10)
  9. Chapter 2: Mix Networks (4/10)
  10. Chapter 2: Mix Networks (5/10)
  11. Chapter 2: Mix Networks (6/10)
  12. Chapter 2: Mix Networks (7/10)
  13. Chapter 2: Mix Networks (8/10)
  14. Chapter 2: Mix Networks (9/10)
  15. Chapter 2: Mix Networks (10/10)
  16. Chapter 3: Application of Mix Network to E-Voting: a Case Study (1/11)
  17. Chapter 3: Application of Mix Network to E-Voting: a Case Study (2/11)
  18. Chapter 3: Application of Mix Network to E-Voting: a Case Study (3/11)
  19. Chapter 3: Application of Mix Network to E-Voting: a Case Study (4/11)
  20. Chapter 3: Application of Mix Network to E-Voting: a Case Study (5/11)
  21. Chapter 3: Application of Mix Network to E-Voting: a Case Study (6/11)
  22. Chapter 3: Application of Mix Network to E-Voting: a Case Study (7/11)
  23. Chapter 3: Application of Mix Network to E-Voting: a Case Study (8/11)
  24. Chapter 3: Application of Mix Network to E-Voting: a Case Study (9/11)
  25. Chapter 3: Application of Mix Network to E-Voting: a Case Study (10/11)
  26. Chapter 3: Application of Mix Network to E-Voting: a Case Study (11/11)
  27. Chapter 4: Onion Routing (1/5)
  28. Chapter 4: Onion Routing (2/5)
  29. Chapter 4: Onion Routing (3/5)
  30. Chapter 4: Onion Routing (4/5)
  31. Chapter 4: Onion Routing (5/5)
  32. Chapter 5: Optimisation and Practical Application of Onion Routing (1/6)
  33. Chapter 5: Optimisation and Practical Application of Onion Routing (2/6)
  34. Chapter 5: Optimisation and Practical Application of Onion Routing (3/6)
  35. Chapter 5: Optimisation and Practical Application of Onion Routing (4/6)
  36. Chapter 5: Optimisation and Practical Application of Onion Routing (5/6)
  37. Chapter 5: Optimisation and Practical Application of Onion Routing (6/6)
  38. Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (1/4)
  39. Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (2/4)
  40. Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (3/4)
  41. Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (4/4)
  42. References (1/2)
  43. References (2/2)

Product information

  • Title: Anonymous Communication Networks
  • Author(s): Kun Peng
  • Release date: April 2014
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439881606