An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks

Provided by: International Journal of Advanced Research in Computer Engineering & Technology
Topic: Security
Format: PDF
Concerns about privacy and security have received greater attention with the rapid growth and public acceptance of the Internet and the pervasive deployment of various network technologies. Anonymous network services is a large field of research and development that steadily continues to grow. Several credential systems have been proposed in which users can authenticate to services anonymously. Various anonymous network are readily available such as tor, i2p these allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. But this provision can be utilized both by the genuine users and misbehaving ones alike. Dishonest users take advantage of anonymity for abusive purpose such as website defacing.

Find By Topic