Computer Science ›› 2019, Vol. 46 ›› Issue (4): 164-171.doi: 10.11896/j.issn.1002-137X.2019.04.026
• Information Security • Previous Articles Next Articles
ZHAO Meng-yao, LI Xiao-yu
CLC Number:
[1]CHAUM D.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88. [2]REED M G,SYVERSON P F,GOLDSCHLAG D M,et al. Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communications,1998,16(4):482-494. [3]DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:The second-generation onion router[C]∥Proceedings of the 13th USENIX Security Symposium.San Diego,USA,2004. [4]WU Q Z,XIE S X,JIA Y L.An improved Tor anonymous communication system[J].Science and Technology Information,2012(19):125-126.(in Chinese) 吴庆震,谢圣献,贾仰理.Tor系统的改进方案[J].科技信息,2012(19):125-126. [5]HUO C Y,WU Z Q.Study and design of bidirectional anonymi- ty communication protocol[J].Computer Engineering,2008,34(19):174-178.(in Chinese) 霍成义,吴振强.双向匿名通信协议的研究与设计[J].计算机工程,2008,34(19):174-178. [6]ZHENG G,XUE Z.A mixed anonymous system based on Tor[J].Information Security and Communications Privacy,2011(12):76-80.(in Chinese) 郑光,薛质.基于Tor的混合匿名转发系统[J].信息安全与通信保密,2011(12):76-80. [7]ZHU Y,FU X W,GRAHAM B,et al.On flow correlation attacks and Countermeasures in mix networks[C]∥Proceedings of the 4th Privacy Enhancing Technology Workshop.Toronto,CANADA,2005:207-225. [8]ZHAO F X,WANG Y M,WANG C J.An authenticated scheme of onion routing[J].Chinese Journal of Computers,2001,24(5):463-467.(in Chinese) 赵福祥,王育民,王常杰.可靠洋葱路由方案的设计与实现[J].计算机学报,2001,24(5):463-467. [9]HE G F,YANG M,LUO J Z,et al.Modeling and analysis of time characteristics used in onion routing traceback techniques[J].Chinese Journal of Computers,2014,37(2):356-372.(in Chinese) 何高峰,杨明,罗军舟,等.洋葱路由追踪技术中时间特征的建模与分析[J].计算机学报,2014,37(2):356-372. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[4] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[5] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[6] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[7] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[8] | CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497. |
[9] | WANG Jin-heng, SHAN Zhi-long, TAN Han-song, WANG Yu-lin. Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network [J]. Computer Science, 2021, 48(6): 338-342. |
[10] | ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300. |
[11] | LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332. |
[12] | JIANG Jian-feng, SUN Jin-xia, YOU Lan-tao. Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network [J]. Computer Science, 2021, 48(11A): 452-455. |
[13] | WANG Yu-chen, QI Wen-hui, XU Li-zhen. Security Cooperation of UAV Swarm Based on Blockchain [J]. Computer Science, 2021, 48(11A): 528-532. |
[14] | MA Lin, WANG Yun-xiao, ZHAO Li-na, HAN Xing-wang, NI Jin-chao, ZHANG Jie. Network Intrusion Detection System Based on Multi-model Ensemble [J]. Computer Science, 2021, 48(11A): 592-596. |
[15] | BAI Xue, Nurbol and WANG Ya-dong. Map Analysis for Research Status and Development Trend on Network Security Situational Awareness [J]. Computer Science, 2020, 47(6A): 340-343. |
|