Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,251,251 papers from all fields of science
Search
Sign In
Create Free Account
I2P — The Anonymous Network
Known as:
Invisible Internet Project
, .i2p
, I2p
Expand
The Invisible Internet Project (I2P) is an overlay network and darknet that allows applications to send messages to each other pseudonymously and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Android
Anonymous blog
Cross-site scripting
CryptoParty
Expand
Broader (1)
Privacy software
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
I2P Anonymous Communication Network Measurement and Analysis
Likun Liu
,
Hongli Zhang
,
Jiantao Shi
,
Xiangzhan Yu
,
Haixiao Xu
International Conference on Smart Computing and…
2019
Corpus ID: 207756659
The I2P (Invisible Internet Project) network is a low-latency anonymous network composed of I2P routers based on garlic routing…
Expand
Review
2017
Review
2017
The research of technologies for secure data communication in dynamic networks
E. A. Kushko
,
N. Parotkin
Dynamics of Systems, Mechanisms and Machines…
2017
Corpus ID: 23364910
Building secure networks is one of the most important tasks of information security. The paper describes the main technologies of…
Expand
2017
2017
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Antonio Montieri
,
D. Ciuonzo
,
Giuseppe Aceto
,
A. Pescapé
International Test Conference
2017
Corpus ID: 3786136
Traffic classification, i.e. associating network traffic to the application that generated it, is an important tool for several…
Expand
2012
2012
An Assessment of Current Attacks on Anonymous Networks
Christopher Zachor
,
M. H. Gunes
2012
Corpus ID: 156053202
Anonymous networks are important for maintaining ones privacy on the internet. However, these networks can be used for both good…
Expand
2012
2012
Anonymization of Web Client Traffic Efficiency Study
T. Sochor
International Conference on Computer Networks
2012
Corpus ID: 31371566
Anonymization in the sense of hiding the originator of the web request could be sometimes useful and it can be done using various…
Expand
2009
2009
Usability Inspection of Anonymity Networks
D. E. D. I. Abou-Tair
,
L. Pimenidis
,
Jens Schomburg
,
Benedikt Westermann
World Congress on Privacy, Security, Trust and…
2009
Corpus ID: 27599230
Today, to be monitored while surfing the web seems to be a natural act and thus tools and applications to achieve online…
Expand
2008
2008
A Research Configuration for a Digital Network Forensic Lab
Jeffrey S. Marean
,
M. Losavio
,
Ibrahim N. Imam
Third International Workshop on Systematic…
2008
Corpus ID: 41820899
Summary form only given. The digital forensic network lab is implemented with the goal of providing all students and faculty with…
Expand
2007
2007
Towards Effective and Efficient NFS Querying on XML Document
Li Xiao
2007
Corpus ID: 64246666
This paper discusses the issue of meaningful result determination for non-fully structured query (NFS) and proposes a scalable PE…
Expand
2006
2006
I2P™ international competition
R. Evans
,
J. Parks
,
S. Nichols
2006
Corpus ID: 185904920
2001
2001
Low-voltage low-sensitivity switched-capacitor bandpass /spl Delta//spl Sigma/ modulator
M. Keskin
,
U. Moon
,
G. Temes
ISCAS . The IEEE International Symposium on…
2001
Corpus ID: 386695
A novel low-voltage (LV) switched-capacitor (SC) resonator circuit and its bandpass /spl Delta//spl Sigma/ modulator…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE