The phenomenal growth of networked computers has fostered the deployment of many network applications such as command and control military communication, Email, web browsing, E-voting, and E-shopping. Many applications need ultra-secure protection. This problem can simply states as: "By the act of communicating, even if perfect confidentiality of the exchanged information is achieved, one can give indications to observing parties of impeding action, capabilities, chains of command, and level of readiness " This book provide a new anonymity mechanism to help hiding user activity over...
The phenomenal growth of networked computers has fostered the deployment of many network applications such as command and control military communica...