Extensive Survey on Anonymity Over Internet and Anonymity Networks
Material type:
TextPublication details: 2016Description: 42Summary: Introduction, Internet Anonymity, Anonymity and Pseudonymity, Anonymity on the Internet, Positive and Negative Elements of Anonymity, Cyber Terrorism and Cyber Warfare, The Appeal of Cyber Terrorism for Terrorists, Dark Web, Hacktivism, Deep Web, Safeguarding Personal Data and Transfer Information, Certification, Authentication, Confidentiality, Privacy of Personal Data, Messaging Privacy, Integrity, Firewalls, The Necessity of Firewall Use, Firewall Design Issues, Features of Firewalls, Firewall Weaknesses, Psudonymity vs. Anonymity, Anonymity Systems, Mix Networks, High-Latency Anonymity Systems, Low-Latency Anonymity Systems, Anonymous Web Browsing, Anonymity Protocols, Anonymizer, Crowds, Onion Routing, TOR, TRUSTe, Lucent Personalized Web Assistant, Hordes, Freedom, I2P, Security Threat Model, Eavesdropping, Denial of Service (DoS) Attack, Conclusion, References.
| Item type | Current library | Call number | Copy number | Status | Barcode | |
|---|---|---|---|---|---|---|
Διπλωματική εργασία
|
MC Athens Campus Library | COMP 2016 (31) (Browse shelf(Opens below)) | 1 | Available | 9780000087058 |
Introduction, Internet Anonymity, Anonymity and Pseudonymity, Anonymity on the Internet, Positive and Negative Elements of Anonymity, Cyber Terrorism and Cyber Warfare, The Appeal of Cyber Terrorism for Terrorists, Dark Web, Hacktivism, Deep Web, Safeguarding Personal Data and Transfer Information, Certification, Authentication, Confidentiality, Privacy of Personal Data, Messaging Privacy, Integrity, Firewalls, The Necessity of Firewall Use, Firewall Design Issues, Features of Firewalls, Firewall Weaknesses, Psudonymity vs. Anonymity, Anonymity Systems, Mix Networks, High-Latency Anonymity Systems, Low-Latency Anonymity Systems, Anonymous Web Browsing, Anonymity Protocols, Anonymizer, Crowds, Onion Routing, TOR, TRUSTe, Lucent Personalized Web Assistant, Hordes, Freedom, I2P, Security Threat Model, Eavesdropping, Denial of Service (DoS) Attack, Conclusion, References.
There are no comments on this title.