安全高效的代理服务器
- 24小时月刊
- 2024-11-30
- 8
Anonymity
1 networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most popular of these networks -- Tor -- has prompted computer scientists to try to come up with more secure anonymity schemes. At the Privacy Enhancing Technologies
Symposium
2 in July, researchers at MIT's Computer Science and Artificial Intelligence Laboratory and the École Polytechnique Fédérale de Lausanne will present a new anonymity scheme that provides strong security guarantees but uses bandwidth much more
efficiently
3 than its
predecessors
4. In experiments, the researchers' system required only one-tenth as much time as existing systems to transfer a large file between
anonymous
5 users., ,"The initial use case that we thought of was to do anonymous file-sharing, where the receiving end and sending end don't know each other," says Albert Kwon, a graduate student in electrical engineering and computer science and first author on the new paper. "The reason is that things like honeypotting" -- in which spies offer services through an anonymity network in order to
entrap
6 its users -- "are a real issue. But we also studied applications in microblogging, something like Twitter, where you want to
anonymously
7 broadcast your messages to everyone.", ,The system devised by Kwon and his coauthors -- his
advisor
8, Srini Devadas, the Edwin Sibley Webster Professor of Electrical Engineering and Computer Science at MIT; David Lazar, also a graduate student in electrical engineering and computer science; and Bryan
Ford
9 SM '02 PhD '08, an associate professor of computer and communication sciences at the École Polytechnique Fédérale de Lausanne -- employs several existing cryptographic techniques but combines them in a novel manner.
本文由明日于2024-11-30发表在生活百科-红苹果乐园,如有疑问,请联系我们。
文章摘自:http://hpgly.com/post/38348.html