A review on Privacy and Anonymity in electronic communications
dc.contributor.author | Benmeziane, Souad | |
dc.contributor.author | Badache, Nadjib | |
dc.date.accessioned | 2016-10-24T14:24:04Z | |
dc.date.available | 2016-10-24T14:24:04Z | |
dc.date.issued | 2006-10-25 | |
dc.description.abstract | Current Internet networking protocols provide no support to ensure the privacy of communication endpoints. An adversary can determine which addresses have asked for which services. Anonymity is now increasingly important for networked applications. This paper overviews the concept of anonymity in electronic communications, vectors for a privacy invasion, and proposed solutions. Solutions are examined from the perspective of attacks which can be reasonably expected against these systems. Particular attention is paid to mobile agents systems and how to hide the itinerary of the agent. | fr_FR |
dc.identifier.uri | http://dl.cerist.dz/handle/CERIST/853 | |
dc.publisher | Conference Procedings | fr_FR |
dc.relation.ispartofseries | International Conference on Multidisciplinary Information Sciences and Technologies, InSciT2006; | |
dc.relation.place | Merida Spain | fr_FR |
dc.structure | Sécurité des données et vie privée | fr_FR |
dc.subject | Anonymity, Mix systems, anonymous mobile agents | fr_FR |
dc.title | A review on Privacy and Anonymity in electronic communications | fr_FR |
dc.type | Conference paper |