All listings for this product
About this product
- DescriptionIn today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anymity is one of the most powerful resources available to counterbalance the threat of unkwn spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anymous Internet usage, Anymous Communication Networks: Protecting Privacy on the Web examines anymous communication networks as a solution to Internet privacy concerns. It explains how anymous communication networks make it possible for participants to communicate with each other without revealing their identities. The book explores various anymous communication networks as possible solutions to Internet privacy concerns-making it ideal for network researchers and anyone interested in protecting their privacy or the privacy of their users. Identifying specific scenarios where it is best to be anymous, it details the two main approaches to anymous communication networks: onion routing and mixed networks. * Details helpful tips for optimizing onion routing * Defines and classifies mixed networks * Illustrates the application of a mixed network to e-voting with a case study * Considers the application of symmetric cipher and Diffie-Hellman key exchange in Tor * Supplies detailed guidance on how to download and install Tor, I2P, JAP/JonDo, and QuickSilver Using examples and case studies, the book illustrates the usefulness of anymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anymous usage permits for cloud software and analyzes the spectrum of existing techniques for anymous cyber surfing. The text concludes by examining future directions to supply you with the understanding required to ensure anymous Internet browsing.
- Author BiographyDr. Kun Peng received his bachelor's degree in software and master's degree in computer security from Huazhong University of Science and Technology, China. He graduated from the Information Security Institute, Queensland University of Technology, Australia, in 2004, obtaining his PhD degree in information security. His main research interest is in applied public key cryptology. His main research interests include applied cryptology, network security, secure e-commerce, and e-government.
- Author(s)Kun Peng
- PublisherTaylor & Francis Ltd
- Date of Publication07/04/2014
- SubjectComputer Communications & Networking
- Place of PublicationLondon
- Country of PublicationUnited Kingdom
- ImprintAuerbach Publishers Inc.
- Content Note21 black & white illustrations, 11 black & white tables
- Weight430 g
- Width156 mm
- Height235 mm
- Spine18 mm
- Format DetailsUnsewn / adhesive bound
Best-selling in Textbooks
Save on Textbooks
- AU $85.90Trending at AU $90.74
- AU $95.88Trending at AU $100.17
- AU $64.63Trending at AU $68.59
- AU $104.88Trending at AU $106.99
- AU $99.90Trending at AU $101.25
- AU $95.00Trending at AU $98.79
- AU $104.88Trending at AU $109.05
This item doesn't belong on this page.
Thanks, we'll look into this.