2018
DOI: 10.1016/j.compeleceng.2017.11.027
|View full text |Cite
|
Sign up to set email alerts
|

Systematic literature review on the state of the art and future research work in anonymous communications systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 97 publications
0
10
0
Order By: Relevance
“…Alidoost and Ruiz-Martínez [2] also published in 2017 a systematic review of the literature on anonymous communication systems. They conduct a review based on the collection of information in 7 academic databases and selected 203 papers for its analysis.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Alidoost and Ruiz-Martínez [2] also published in 2017 a systematic review of the literature on anonymous communication systems. They conduct a review based on the collection of information in 7 academic databases and selected 203 papers for its analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Tor [1] is currently the most broad low-latency anonymous communication network and is used everyday by many people to protect their privacy and overcome censorship [2,3].…”
Section: Introductionmentioning
confidence: 99%
“…The Onion Router (Tor) [1] is currently the broadest low-latency anonymous communication network and is used every day by many people to protect their privacy and overcome censorship [2,3]. The common belief in the Tor project is that "[I]nternet users should private access to an uncensored web" [4].…”
Section: Introductionmentioning
confidence: 99%
“…The main function that provides Tor to any citizen is, through a set of nodes in the Tor network, to protect his/her anonymity by hiding his/her network IP address [1]. The security and anonymity of Tor have been deeply studied in many works [2,5], and although different types of attacks are possible [3,6], the research community is working toward providing solutions to the different attacks [5,7,8].…”
Section: Introductionmentioning
confidence: 99%
“…As we have shown in Reference, Sha et al's scheme is susceptible to desynchronization and known session‐specific temporary information attacks and cannot provide the perfect forward secrecy and anonymity. As mentioned in Reference , anonymous communications are important as they greatly help to keep the privacy of communicating participants. To remedy these challenges, in Reference , we have proposed a security‐enhanced scheme using the enhanced Chebyshev chaotic maps.…”
Section: Introductionmentioning
confidence: 99%