We love eBooks
    Anonymous Communication Networks: Protecting Privacy on the Web

    This site is safe

    You are at a security, SSL-enabled, site. All our eBooks sources are constantly verified.

    Anonymous Communication Networks: Protecting Privacy on the Web

    By Kun Peng

    What do you think about this eBook?

    About

    In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

    Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with each other without revealing their identities.

    The book explores various anonymous communication networks as possible solutions to Internet privacy concerns—making it ideal for network researchers and anyone interested in protecting their privacy or the privacy of their users. Identifying specific scenarios where it is best to be anonymous, it details the two main approaches to anonymous communication networks: onion routing and mixed networks.



    • Details helpful tips for optimizing onion routing

    • Defines and classifies mixed networks

    • Illustrates the application of a mixed network to e-voting with a case study

    • Considers the application of symmetric cipher and Diffie-Hellman key exchange in Tor

    • Supplies detailed guidance on how to download and install Tor, I2P, JAP/JonDo, and QuickSilver


    Using examples and case studies, the book illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anonymous usage permits for cloud software and analyzes the spectrum of existing techniques for anonymous cyber surfing. The text concludes by examining future directions to supply you with the understanding required to ensure anonymous Internet browsing.

    Download eBook Link updated in 2017
    Maybe you will be redirected to source's website
    Thank you and welcome to our newsletter list! Ops, you're already in our list.

    Related to this eBook

    Browse collections Find similar eBooks

    Keep connected to us

    Follow us on Social Media or subscribe to our newsletter to keep updated about eBooks world.

    Explore eBooks

    Browse all eBook collections

    Collections is the easy way to explore our eBook directory.