American Scientific Publishers, Journal of Computational and Theoretical Nanoscience, 3(21), p. 472-477
Full text: Unavailable
Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender’s identity, different implementations have proven successful-one of which is the invention of anonymous networks. This paper presents a thorough study of NetCamo-one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity. The paper discusses its implementation and techniques in details. The paper also presents the benefits and drawbacks of NetCamo.