X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/internet.git/blobdiff_plain/9b79dfda19e40131cce85440b164977e00192de2..241cb9b78210137a5de34683da8cfaff8d643eea:/keywords.txt?ds=sidebyside diff --git a/keywords.txt b/keywords.txt index 2186c8d..78e8c71 100644 --- a/keywords.txt +++ b/keywords.txt @@ -1,32 +1,24 @@ -Titre : Information hiding techniques for Internet anonymity +Titre : Information Hiding for Internet Anonymity -==================== Christophe ============================ - -Anonymous communication through the Internet +Security issues in raised by anonymity through the Internet +Security proofs in the context of Internet Anonymity +Attacks and counter-attacks of anonymity Digital watermarking and steganography for Internet anonymity -Multimedia forensics and counter forensics Combination of data hiding and cryptography for Internet anonymity -Steganography and steganalysis applied to the Internet -Anonymity and privacy through the Internet -Information theory of anonymity -Stochastic aspects of anonymity through the Internet -Covert/subliminal channels through the Internet +Anonymity and Robustness in Encryption Schemes Cryptography and cryptanalysis for Internet anonymity -Mathematical modeling of Internet anonymity -Attacks and counter-attacks of anonymity -Security issues in raised by anonymity through the Internet -Channel coding techniques for anonymity -Security proofs in the context of Internet Anonymity Secret-key and public-key cryptography for guaranteeing anonymity -Efficient implementations of anonymity through the Internet Pseudorandomness use for anonymity -Identification of acquisition systems +Stochastic aspects of anonymity through the Internet +Channel coding techniques for anonymity +Efficient implementations of anonymity through the Internet +Anonymity and privacy through the Internet +Anonymous communication through the Internet + +Anonymity Metrics +Theory of Anonymity + + -==================== Jean-François ========================= -General : Anonymity and Privacy -Anonymity and Robustness in Encryption Schemes -Protecting User Privacy -Anonymity attacks -Anonymity metric