Human Proxies in Cryptographic Networks

Human Proxies in Cryptographic Networks
Author :
Publisher : BoD – Books on Demand
Total Pages : 228
Release :
ISBN-10 : 9783759705044
ISBN-13 : 3759705049
Rating : 4/5 (44 Downloads)

Book Synopsis Human Proxies in Cryptographic Networks by : Uni Nurf

Download or read book Human Proxies in Cryptographic Networks written by Uni Nurf and published by BoD – Books on Demand. This book was released on 2024-06-27 with total page 228 pages. Available in PDF, EPUB and Kindle. Book excerpt: Human Proxies offer new directions to end-to-end encryption: End-A-to-End-Z encryption must be rethought when it turns out to be an End-B-to-End-Z encryption. And, Human Proxies raise questions that were neither answered by science, journalists nor the public. Regular Proxies on a network are forwarding Internet requests, e.g., to download a webpage. Also, in political and social settings a Proxy as an intermediate, deputy or representative with a similar function is given. Human Proxies now enable within the Encryption and Messenger Application Spot-On to choose a friend as a Human Proxy. The Spot-On program is a most modern and elaborated encryption suite available for several operation systems and provides many innovations in applied cryptography. It builds based on the Echo Protocol a cryptographic network, that is beyond Cryptographic Routing. With Human Proxies now a friend from the Messenger friends list sends out the chat message instead of the original sender. The construct of the "Inner Envelope" behind the Human Proxy function also creates new cryptographic challenges, provides plausible deniability to included nodes, and offers new perspectives in encryption, its analysis and decryption: As all messages in the network are encrypted, end-to-end encryption is new defined and gets with Human Proxies a potential second and plausible deniable start point. The essay in this book discusses some related aspects of Human Proxies and their referring's to encryption, networking, graph theory and comparable social and political processes of Proxies. This leads to a further general approach: Endpoints in Encryption are equipped by the application Spot-On with the vision of interoperability of endpoints in communications. | English & German language.


Human Proxies in Cryptographic Networks Related Books

Human Proxies in Cryptographic Networks
Language: en
Pages: 228
Authors: Uni Nurf
Categories: Computers
Type: BOOK - Published: 2024-06-27 - Publisher: BoD – Books on Demand

DOWNLOAD EBOOK

Human Proxies offer new directions to end-to-end encryption: End-A-to-End-Z encryption must be rethought when it turns out to be an End-B-to-End-Z encryption. A
Human Machine Interaction in the Digital Era
Language: en
Pages: 336
Authors: J Dhilipan
Categories: Computers
Type: BOOK - Published: 2024-05-23 - Publisher: CRC Press

DOWNLOAD EBOOK

The Human Machine Interaction in the Digital Era (ICHMIDE) 2023 conference aims to address the main issues of concern in the design issues with a particular emp
Applied Cryptography and Network Security
Language: en
Pages: 520
Authors: Kazue Sako
Categories: Computers
Type: BOOK - Published: 2021-06-09 - Publisher: Springer Nature

DOWNLOAD EBOOK

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021,
Proceedings of International Conference on Computing and Communication Networks
Language: en
Pages: 590
Authors: Ali Kashif Bashir
Categories: Technology & Engineering
Type: BOOK - Published: 2022-07-08 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book includes selected peer-reviewed papers presented at the International Conference on Computing and Communication Networks (ICCCN 2021), held at Manches
Cryptography
Language: en
Pages: 628
Authors: Zoubir Z. Mammeri
Categories: Computers
Type: BOOK - Published: 2024-02-13 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security,