scholarly journals Establishing Bilateral Anonymous Communication in Open Networks

Author(s):  
Thomas Demuth
2011 ◽  
Vol 22 (10) ◽  
pp. 2358-2371 ◽  
Author(s):  
Lu ZHANG ◽  
Jun-Zhou LUO ◽  
Ming YANG ◽  
Gao-Feng HE

Author(s):  
Keith M. Martin

This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.


Author(s):  
Huiying Hou ◽  
Jianting Ning ◽  
Yunlei Zhao ◽  
Robert Deng

2019 ◽  
Vol 957 ◽  
pp. 247-254
Author(s):  
Markus Moritz ◽  
Daniel Fuchs ◽  
Marian Gheorghe

In general, networks in companies or between companies play a significant role for monetary as well as non-monetary enhancement through cooperation. The aim is a positive effect for reducing innovation cycles, reducing costs and establishing a well-balanced time to market strategy. Besides open networks, where every actor is known, the existence of hidden networks, internal as well as external, have a substantial impact on strategic and operational activities meaning either a contribution or threat for the actors outside the hidden network. With the new models introduced in this publication, actors in various environments are able to identify hidden networks in order to be able to push contributions or eliminate risks leading from profit cuts to illegal knowledge transfer.


2015 ◽  
Vol 2015 (1) ◽  
pp. 4-24 ◽  
Author(s):  
Aaron D. Jaggard ◽  
Aaron Johnson ◽  
Sarah Cortes ◽  
Paul Syverson ◽  
Joan Feigenbaum

Abstract Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular system that allows users to efficiently and conveniently create such distributions and use them to improve their security. To illustrate this system, we present two novel types of adversaries. First, we study a powerful, pervasive adversary that can compromise an unknown number of Autonomous System organizations, Internet Exchange Point organizations, and Tor relay families. Second, we initiate the study of how an adversary might use Mutual Legal Assistance Treaties (MLATs) to enact surveillance. As part of this, we identify submarine cables as a potential subject of trust and incorporate data about these into our MLAT analysis by using them as a proxy for adversary power. Finally, we present preliminary experimental results that show the potential for our trust framework to be used by Tor clients and services to improve security.


2017 ◽  
Vol 31 (4) ◽  
pp. 420-435 ◽  
Author(s):  
J.-M. Fourneau ◽  
Y. Ait El Majhoub

We consider open networks of queues with Processor-Sharing discipline and signals. The signals deletes all the customers present in the queues and vanish instantaneously. The customers may be usual customers or inert customers. Inert customers do not receive service but the servers still try to share the service capacity between all the customers (inert or usual). Thus a part of the service capacity is wasted. We prove that such a model has a product-form steady-state distribution when the signal arrival rates are positive.


Sign in / Sign up

Export Citation Format

Share Document