-
1دورية أكاديمية
المؤلفون: Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, Cecilia Labrini, Sara Lazzaro
المصدر: Applied Sciences, Vol 12, Iss 1, p 137 (2021)
مصطلحات موضوعية: anonymous communication systems, Tor, Onion, censorship resistance, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
وصف الملف: electronic resource
-
2
المصدر: 2021 IEEE Global Communications Conference (GLOBECOM).
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::7d989666611221d11941418e636ae8e0
https://doi.org/10.1109/globecom46510.2021.9685284 -
3
المصدر: WiMob
مصطلحات موضوعية: Computer science, Hardening (metallurgy), Content delivery, Computer security, computer.software_genre, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::30785e80779ccb63d60a7558b1a22ee8
https://doi.org/10.1109/wimob52687.2021.9606305 -
4
المصدر: CW
مصطلحات موضوعية: Cover (telecommunications), business.industry, Computer science, Threat model, Overlay network, Topology (electrical circuits), Latency (engineering), Routing (electronic design automation), Encryption, business, Anonymity, Computer network
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::accd9824967087d24dd61881f71bc61b
https://doi.org/10.1109/cw52790.2021.00048 -
5
المصدر: Securing Social Networks in Cyberspace ISBN: 9781003134527
Securing Social Networks in Cyberspaceمصطلحات موضوعية: Computer science, business.industry, Internet privacy, k-anonymity, business
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::465698bba6ecd9324e0f25d6da619a8d
https://doi.org/10.1201/9781003134527-4 -
6
المصدر: Online Social Networks and Media. 31:100221
مصطلحات موضوعية: Computer Networks and Communications, Communication, Information Systems
-
7
المصدر: WOWMOM
مصطلحات موضوعية: Routing protocol, business.industry, Computer science, Node (networking), Data_MISCELLANEOUS, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Overlay network, Adversary, Traffic flow (computer networking), Multiple encryption, business, Adversary model, Anonymity, Computer network
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::ee96dd223d77ff141f22fcf2bcbbe350
https://doi.org/10.1109/wowmom51794.2021.00041 -
8
المصدر: MDM
مصطلحات موضوعية: Service (business), Multicast, Cover (telecommunications), Computer science, Location-based service, k-anonymity, Single point of failure, Adversary, Computer security, computer.software_genre, computer, Drawback
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::b0a5f016801c81dd6faa527e99330d1d
https://doi.org/10.1109/mdm52706.2021.00029 -
9
المصدر: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030900212
SecureComm (2)مصطلحات موضوعية: Routing protocol, Social network, Computer science, business.industry, Latency (audio), Context (language use), Adversary, Computer security, computer.software_genre, Overhead (computing), Communications protocol, business, computer, Anonymity
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::2dce0059e9b5e921b7df6fce92e6fd01
https://doi.org/10.1007/978-3-030-90022-9_3 -
10
المصدر: ICAIT
مصطلحات موضوعية: Polymorphic code, Social network, Exploit, business.industry, Open-source intelligence, Computer science, Programming paradigm, Task analysis, The Internet, business, Programmer, Data science
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::20415a441c97e1eb91518863cfb750db
https://doi.org/10.1109/icait51223.2020.9315457