Search
Now showing items 1-3 of 3
Empirical performance evaluation of QUIC protocol for Tor anonymity network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
CloudSafe: A tool for an automated security analysis for cloud computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ...
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...