Computer Science ›› 2016, Vol. 43 ›› Issue (10): 154-159.doi: 10.11896/j.issn.1002-137X.2016.10.029
Previous Articles Next Articles
WANG Shao-hui, JIANG Ji-hong and XIAO Fu
[1] Chaum D L.Untraceable electronic mail,return addresses,anddigital pseudonyms [J].Communications of the ACM,1981,24(2):84-90 [2] Goldschlag D,Reed M,Syverson P,et al.Onion routing for anonymous and private internet connections [J].Communications of the ACM,1999,42(2):39-41 [3] Dingledine R,Mathewson N,Syverson P.Tor:The second-generation onion router [C]∥Proceedings of the 13th Usenix Security Symposium.2004:303-319 [4] Reiter M K,Rubin A D.Anonymous Web transaction withcrowds [J].Communications of ACM,1999,42(2):32-48 [5] Berthold O,Federrath H,Kopsell S.Web Mixes:A System for Anonymous and Unobservable Internet Access[C]∥Procee-dings of Designing privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability.Springer,Heidellberg,2000:115-129 [6] Wright M,Adler M,Levine B,et al.An analysis of the degradation of anonymous protocols[C]∥Proc of Network and Distri-buted System Security Symposium.California,2002:34-43 [7] Liu Pei-peng,Wang Li-hong,Shi Jing-qiao,et al.Towards Analysis of Security in I2P’s Path Selection[J].Journal of Computer Research and Development,2014(7):1555-1564(in Chinese) 刘培朋,王丽宏,时今桥,等.匿名网络I2P路径选择的安全性分析[J].计算机研究与发展,2014(7):1555-1564 [8] Wright M,Adler M,Levine B N,et al.Defending anonymouscommunication against passive logging attacks[C]∥Proc of IEEE Symposium on Security and Privacy.Berkeley,2003:28-41 [9] Matthew W,Micah A,Brian N L,et al.Defending anonymouscommunication against passive logging attacks[C]∥Proceedings of the 2003 IEEE Symposium on Security and Privacy(IEEE S&P 2003).IEEE Computer Society Press,2003:28-43 [10] Sen S,Wang Jia.Analyzing peer-to-peer traffic across large networks[J].IEEE/ACM Transactions on Networking,2004,12(2):219-232 [11] Mitomo M,Kurosawa K.Attack for Flash MIX[C]∥Procee-dings of the 6th International Conference on the Theory and Application of Cryptology and Information Security.Springer-Verlag,2000:192-204 [12] Zhang Jia,Duan Hai-xin,Liu Wu,et al.Anonymity analysis of P2P anonymous communication systems[J].Computer Communications,2010,34(3):358-366 [13] Reiter M,Rubin A.Crowds:Anonymity for Web Transactions[J].ACM Transactions on Information and System Security,1998,1(1):66-92 [14] Diaz C.Anonymity and Privacy in Electronic Services[D].Electrical Engineering department of Katholieke University Leuven,2005:23-40 |
No related articles found! |
|