000 01338cam a22001814a 4500
005 20250605164344.0
008 250528s ||||||||||||||||||||||||d
035 _a23769
040 _aGR-AtMCL
_bgre
_dGR-AtMCL
_eAACR2
245 1 _aExtensive Survey on Anonymity Over Internet and Anonymity Networks
260 _c2016
300 _a42
520 _aIntroduction, Internet Anonymity, Anonymity and Pseudonymity, Anonymity on the Internet, Positive and Negative Elements of Anonymity, Cyber Terrorism and Cyber Warfare, The Appeal of Cyber Terrorism for Terrorists, Dark Web, Hacktivism, Deep Web, Safeguarding Personal Data and Transfer Information, Certification, Authentication, Confidentiality, Privacy of Personal Data, Messaging Privacy, Integrity, Firewalls, The Necessity of Firewall Use, Firewall Design Issues, Features of Firewalls, Firewall Weaknesses, Psudonymity vs. Anonymity, Anonymity Systems, Mix Networks, High-Latency Anonymity Systems, Low-Latency Anonymity Systems, Anonymous Web Browsing, Anonymity Protocols, Anonymizer, Crowds, Onion Routing, TOR, TRUSTe, Lucent Personalized Web Assistant, Hordes, Freedom, I2P, Security Threat Model, Eavesdropping, Denial of Service (DoS) Attack, Conclusion, References.
700 1 _aChondrodimos George K
_99302
942 _cDS
999 _c8706
_d8706