A review on Privacy and Anonymity in electronic communications

dc.contributor.authorBenmeziane, Souad
dc.contributor.authorBadache, Nadjib
dc.date.accessioned2016-10-24T14:24:04Z
dc.date.available2016-10-24T14:24:04Z
dc.date.issued2006-10-25
dc.description.abstractCurrent Internet networking protocols provide no support to ensure the privacy of communication endpoints. An adversary can determine which addresses have asked for which services. Anonymity is now increasingly important for networked applications. This paper overviews the concept of anonymity in electronic communications, vectors for a privacy invasion, and proposed solutions. Solutions are examined from the perspective of attacks which can be reasonably expected against these systems. Particular attention is paid to mobile agents systems and how to hide the itinerary of the agent.fr_FR
dc.identifier.urihttp://dl.cerist.dz/handle/CERIST/853
dc.publisherConference Procedingsfr_FR
dc.relation.ispartofseriesInternational Conference on Multidisciplinary Information Sciences and Technologies, InSciT2006;
dc.relation.placeMerida Spainfr_FR
dc.structureSécurité des données et vie privéefr_FR
dc.subjectAnonymity, Mix systems, anonymous mobile agentsfr_FR
dc.titleA review on Privacy and Anonymity in electronic communicationsfr_FR
dc.typeConference paper
Files