Back to Results
First PageMeta Content
Internet / Distributed data storage / Crowds / Routing / Freenet / Network coding / Onion routing / Peer-to-peer / Tor / Computing / Software / Internet privacy


Information Slicing: Anonymity Using Unreliable Overlays Sachin Katti Jeff Cohen Dina Katabi [removed] [removed] [removed]
Add to Reading List

Document Date: 2011-08-22 17:21:51


Open Document

File Size: 277,65 KB

Share Result on Facebook

Continent

Asia / North America / Europe / South America / /

Currency

pence / /

/

IndustryTerm

Internet access / local area network / directory server / lost redunmunication systems / local 1Gbps network / Internet cafe / local-area network / gossip protocol / public key infrastructure / profor everyday applications / local and wide-area networks / anonymous communications / construction algorithm / anonymous routing protocol / pi-secure information slicing algorithm / online tination / file-sharing network / admission server / wide-area network / overlay software supports information slicing / overlay network / multicast / /

MarketIndex

SET 100 / /

Person

Anonymity Source Anonymity / Bob Stage / Alice Alice / Ai / Sachin Katti Jeff Cohen Dina / /

Position

Forward Information Slices After / /

Technology

encryption / pi-secure information slicing algorithm / cryptography / RAM / public key infrastructure / key-based encryption / public key / DNS / artificial intelligence / protocol for the local area network / peer-to-peer / PKI / 1 Information Slicing Algorithm / P2P / file sharing / ISP / anonymous routing protocol / gossip protocol / secret key / simulation / construction algorithm / 4.3 Protocol / public key encryption / /

SocialTag