An Architecture to Achieve Anonymity and Traceability
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 1, Issue 4
Abstract
Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality, data integrity, and nonrepudiation.
Authors and Affiliations
S Reshma
Evaluate the Effectiveness of Test Suite Prioritization Techniques Using APFD Metric
Abstract: Regression testing is a testing activity that is performed to provide confidence that changes do not harm the existing behavior of the software. Test suites tend to grow in size as software evolves...
A Review on Systematic Quality Software Designing and DevelopmentPractices
Abstract: Software Engineering process, technology and the results cover the definition of suitable models for the environment to ensure its quality.Any software development project is very important to create quality so...
Color Based Image Retrieval System
Advances in the data storage and image acquisition technologies have enabled the creation of large datasets. It is necessary to develop appropriate information systems to efficiently manage these collections. T...
A Web Extraction Using Soft Algorithm for Trinity Structure
Abstract: Trinity is a structure for automatically fetch or extract or segment the content from the website or thewebpages by the source of internet. The required applications are done by the trinity nature in orde...
Prevention of SQL Injection Attacks having XML Database
XML-based Web applications are broadly utilized in computer world, whose main applications are remote operation performance and bring arbitrary data. It is recently used in cloud interfaces, E-Government, ...