Show simple item record

dc.contributor.authorKovraiskyi, Anton
dc.contributor.authorMieshkov, V.I.
dc.contributor.authorGubkina, V.V.
dc.date.accessioned2017-07-06T08:49:33Z
dc.date.available2017-07-06T08:49:33Z
dc.date.issued2017
dc.identifier.citationKovraiskyi A. TOR Secure Network / Anton Kovraiskyi, V. I. Mieshkov, V.V. Gubkina // Розширюючи обрії : зб. тез 12-го міжнародного форуму студентів і молодих учених, 20-21 квітня, 2017 р. [Електронний ресурс]. Т. 2. - 2017. - P. 131.ru_RU
dc.identifier.urihttp://ir.nmu.org.ua/handle/123456789/149593
dc.description.abstractSo what is TOR? TOR is an anonymity network for “silent” usage by anyone who wants to stay hidden from any other secret service etc. Does it actually work as it is supposed to do? It depends on different circumstances. TOR contains nodes, which are placed all over the globe. The nodes are needed to route user traffic flows over randomly picked rows of nodes to hide which node user is getting access to. If a bad guy can track through which node the traffic is flowing, he can compare received data and confirm what destination user is connected to.ru_RU
dc.language.isoenru_RU
dc.publisherВидавництво НГУru_RU
dc.subjectTOR Secure Networkru_RU
dc.subjectЗащищенная сеть TORru_RU
dc.titleTOR Secure Networkru_RU
dc.typeArticleru_RU


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record