[1] |
SHAHBAR K , ZINCIR-HEYWOOD A N . Weighted factors for measuring anonymity services:a case study on Tor,jondonym,and I2P[R]. 2017.
|
[2] |
ZHOU Y W , YANG Q L , YANG B ,et al. A Tor anonymous communication system with security enhancements[J]. Journal of Computer Research and Development, 2014,51(7): 1538-1546.
|
[3] |
CONRAD B , SHIRAZI F . A survey on Tor and I2P[C]// The 9th International Conference on Internet Monitoring and Protection (ICIMP 2014). 2014.
|
[4] |
GAO J J . Optimization and implementation of I2P anonymous communication system[D]. Beijing:Peking University, 2014.
|
[5] |
TIMPANARO J P , CHOLEZ T , CHRISMENT I ,et al. Evaluation of the anonymous I2P network's design choices against performance and security[C]// The 1st International Conference on Information Systems Security and Privacy (ICISSP 2015). 2015: 46-55.
|
[6] |
ZHOU Y . Research on anymous communication based on Tor[D]. Xian:Xidian University,2013, 10.
|
[7] |
HUANG W J . Uniform distribution routing algorithm based on Tor network[D]. Shanghai:Shanghai Jiaotong University, 2012.
|
[8] |
LI J S . Research on the Analysis of I2P anonymous communication protocol and flow identification[D]. School of Computer Science &Engineering, 2015.
|
[9] |
CONTI M , CRANE S , FRASSETTO T ,et al. Selfrando:securing the Tor browser against de-anonymization exploits[J]. Proceedings on Privacy Enhancing Technologies, 2016(4): 454-459.
|
[10] |
CONRAD B , SHIRAZI F . A survey on Tor and I2P[C]// The 9th International Conference on Internet Monitoring and Protection (ICIMP 2014). 2014.
|
[11] |
TIMPANARO J P , CHOLEZ T , CHRISMENT I ,et al. Evaluation of the anonymous I2P network’s design choices against performance and security[C]// The 1st International Conference on Information Systems Security and Privacy(ICISSP 2015). 2015: 46-55.
|
[12] |
ALI A , KHAN M , SADDIQUE M ,et al. TOR vs I2P:a comparative Study[C]// 2016 IEEE International Conference on Industrial Technology (ICIT). 2016.
|
[13] |
TIMPANARO J P , CHOLEZ T , CHRISMENT I ,et al. Evaluation of the anonymous I2P network's design choices against performance and security[C]// The 1st International Conference on Information Systems Security and Privacy (ICISSP 2015). 2015: 46-55.
|
[14] |
KARTHIGEYAN A , ROBINSON J M , MANIKANDAN S P ,et al. A comprehensive behavior analysis of Tor versus I2P[C]// International Journal of Applied Engineering Research, 2014,9(20): 7333-7345.
|
[15] |
HERMANN M . Privacy-implications of performance-based peer selection by onion-routers:a real-world case study using I2P[D]. TU-Munich, 2011.
|
[16] |
HERRMANN M , CHRISTIAN G . Privacy implications of performance-based peer selection by onion routers:a real-world case study using I2P[C]// 11th Privacy Enhancing Technologies Symposium (PETS 2011). 2011.
|
[17] |
KARTHIGEYAN A , ROBINSON J M , MANIKANDAN S P ,et al. A comprehensive behavior analysis of Tor versus I2P[J]. International Journal of Applied Engineering Research, 2014,9(20): 7333-7345.
|
[18] |
JEONG S H , . A longitudinal analysis of I2P leakage in the public DNS infrastructure[C]// 2016 Conference on ACM SIGCOMM. 2016: 557-558.
|
[19] |
SHAHBAR K . Analysis of multilayer-encryption anonymity networks[D]. Canada:Dalhousie University, 2017.
|