Tor network anonymity evaluation based on node anonymity.
Jun CuiChangqi HuangHuan MengRan WeiPublished in: Cybersecur. (2023)
Keyphrases
- anonymous communication
- trusted third party
- network model
- electronic cash
- privacy protection
- social network data
- ring signature scheme
- location privacy
- network nodes
- hidden nodes
- evaluation method
- network traffic
- sensed data
- network structure
- neighboring nodes
- computer networks
- small world networks
- intermediate nodes
- peer to peer
- intrusion detection
- payment scheme
- overlapping communities
- community structure
- link prediction
- wireless sensor networks
- network topologies
- path length
- mobile nodes