3   Artículos

 
en línea
Junqiang Chen, Guang Cheng and Hantao Mei    
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mario Noseda, Lea Zimmerli, Tobias Schläpfer and Andreas Rüst    
New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT devices. From a security point of view, this leads to high exposure of such IoT devices. Consequently, even though they are highly resource-constrained, these IoT devic... ver más
Revista: IoT    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »