新书报道
当前位置: 首页 >> 电类优秀教材 >> 正文
Anonymous communication networks : protecting privacy on the web
发布日期:2016-06-07  浏览

[内容简介]

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on anonymous Internet usage,Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with each other without revealing their identities.

The book explores various anonymous communication networks as possible solutions to Internet privacy concerns―making it ideal for network researchers and anyone interested in protecting their privacy or the privacy of their users. Identifying specific scenarios where it is best to be anonymous, it details the two main approaches to anonymous communication networks: onion routing and mixed networks.
  • Details helpful tips for optimizing onion routing
  • Defines and classifies mixed networks
  • Illustrates the application of a mixed network to e-voting with a case study
  • Considers the application of symmetric cipher and Diffie-Hellman key exchange in Tor
  • Supplies detailed guidance on how to download and install Tor, I2P, JAP/JonDo, and QuickSilver
Using examples and case studies, the book illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anonymous usage permits for cloud software and analyzes the spectrum of existing techniques for anonymous cyber surfing. The text concludes by examining future directions to supply you with the understanding required to ensure anonymous Internet browsing.


[目录]

Anonymity in Network Communication 
Right To Be Anonymous
When We Need to Be Anonymous
The Current Situation and Where We Start

Mix Networks 
Definition of Mix Network
Classification of Mix Networks
     Decryption Chain or Re-encryption
     General or Separate Verification
     Tag Attached to Input
     Summary 
Efficient and Secure GMN: a Simple and Efficient Solution
     The GMN in [92]
     Analysis and Summary
Efficient and Secure SMN: the Most Important Mix Network
     SMN Employing Multiplicative Homomorphic Encryption Algorithm 
     SMN Employing Additive Homomorphic Encryption Algorithm
Grouped Shuffling: a Trade-off to Improve Efficiency of Mix Networks
     Group Shuffling in [93]
     Another Grouped Shuffling Protocol to Support Efficient SMN 
Survey and Analysis of SMN
     The Assumptions Needed in the Mix Networks in [51] and [52] 
     Security Concerns in [90] and [102]
     Failure in Functionality of the Mix Network by Wikstrom
Efficiency of SMN: Claim and Reality
     Unfair Usage of Short Exponents
     Other Unfair Factors in Efficiency Claim and Comparison
     Re-evaluating Efficiency
Summary

Application of Mix Network to E-Voting: A Case Study
Mix Network for E-Voting
     The Recent Mix Network Schemes
     The New Mix Network
     Security and Efficiency Analysis
     Extension and Application
Mix Network-Based E-Voting
Security Concerns and Suggested Solution in Practice
     Various Relation Attacks and the Existing Countermeasures
     Main Idea of the New Countermeasure
     A Prototype and Its Drawbacks
     Optimization and Security Analysis
Off-Line Pre-Computation in Mix Networks
     Security Model of Shuffles 
     The Basic Design 
     Off-Line Pre-Computation and Batch Verification 
     The Final Shuffling Protocol:Modifying Encryption and Further Improving Efficiency
     Comparison and Conclusion 

Onion Routing
The Basic Idea
Formal Definition of Security
Second Generation: Tor 
     Design of Tor 
     Application of Symmetric Cipher and Diffie-Hellman Key Exchange in Tor: Efficiency Improvement

Optimisation and Practical Application of Onion Routing
Verifiable TOR: a Verifiable Application of Onion Routing
     Preliminaries
     Advanced Tor with a Verification Mechanism
Efficiency Improvment Using Diffie-Hellman Chain 
     A Simple Optimisation of Tor and its Drawback: Simpler but Still Direct Application of Diffie-Hellman Key Exchange 
     A New and More Advanced Technique: Diffie-Hellman Chain 
     Analysis and Comparison
     Further Optimisation: Small Compressed Onion Routing
A Practical Application: Paid and Anonymous Use Of Cloud Softwares
     How to Obtain Anonymous Usage Permit of a Cloud Software: Anonymous Token 
     Two-Way Onion Routing to Support Anonymous Usage of Cloud Software
     Efficiency Optimisation: Two-Way Onion Routing with Compact Diffie-Hellman Handshakes
     Security Analysis

Practical Systems to Achieve Anonymity: How to Use Them
Installation and Usage of Tor
     Download and Installation
     Configuration
Installation and Usage of I2P
     Download and Installation
     Configuration
Installation and Usage of JAP/JonDo
     Download and Installation
     Configuration
Installation and Usage of Quicksilver
     Download and Installation
     Configuration
References 
Index

关闭


版权所有:西安交通大学图书馆      设计与制作:西安交通大学数据与信息中心  
地址:陕西省西安市碑林区咸宁西路28号     邮编710049

推荐使用IE9以上浏览器、谷歌、搜狗、360浏览器;推荐分辨率1360*768以上