Download now Free registration required
As communication becomes more and more an integral part of the people day to day lives, the need to access information increases as well. Security is currently one of the most important factors to consider in the authors' aim to achieve ubiquitous computing, and with it raises the problem of how to manipulate data while maintaining secrecy and integrity. This paper presents one of the most common widely used data communication systems for avoiding traffic analysis as well as assuring data integrity - I2P. I2P, just like every other technology aimed at securing data, has its pros and cons. The paper presents the benefits and drawbacks of I2P.
- Format: PDF
- Size: 183.26 KB