Achieving greater anonymity in network latency
Achieving greater anonymity in network latency作者机构:Mathematics and Computer Science Fort Hays State University Hays Kansas 67601 USA Department of Teaching and Learning University of North Dakota ND 58202 USA Department of Media and Instructional Tech Florida Atlantic University FL 33431 USA
出 版 物:《通讯和计算机(中英文版)》 (Journal of Communication and Computer)
年 卷 期:2009年第6卷第12期
页 面:38-46页
学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 0839[工学-网络空间安全] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)]
主 题:匿名通信 网络延迟 lnternet 实用技术 内容信息 目标位置 网络能力 网络延时
摘 要:Each Internet communication leaves trails that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users identity as to personal, source, destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency[1], thus, the minimization of anonymity leakage in network latency becomes critically salient. The purpose of this paper is to investigate network latency anonymity leaks, and propose practical techniques for their reduction. In this direction, the author investigate the following technical question: What implementation techniques can be configured to truly reduce anonymity leaks using deployable systems and exploiting the popular Tor security strategies.