RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCIESCOPUSKCI등재

        The TOR Data Communication System

        Haraty, Ramzi A.,Zantout, Bassam The Korea Institute of Information and Commucation 2014 Journal of communications and networks Vol.16 No.4

        Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.

      • KCI등재

        The TOR Data Communication System

        Ramzi A. Haraty,Bassam Zantout 한국통신학회 2014 Journal of communications and networks Vol.16 No.4

        Since the day the Internet became a common and reliablemechanism for communication and data transfer, securityofficers and enthusiasts rallied to enforce security standards ondata transported over the globe. Whenever a user tries communicatingwith another recipient on the Internet, vital information issent over different networks until the information is dropped, intercepted,or normally reaches the recipient. Critical informationtraversing networks is usually encrypted. In order to conceal thesender’s identity, different implementations have proven successful- one of which is the invention of anonymous networks. Thispaper thoroughly investigates one of the most common and existingtechniques used during data communication for avoiding trafficanalysis as well as assuring data integrity - the onion router (TOR). The paper also scrupulously presents the benefits and drawbacksof TOR

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼