[1] |
CLAESSENS J , DIAZ C , GOEMANS C . Revocable anonymous access to the internet[A]. Internet Research:Electronic Networking Application and Policy[C]. 2003. 13-25.
|
[2] |
吴艳辉, 王伟平, 陈建二 . 匿名通信研究综述[J]. 小型微型计算机系统, 2007,4(5): 583-587. WU Y H , WANG W P , CHEN J E . Anonymous communication:a survey[J]. Journal of Chinese Computer Systems, 2007,4(5): 583-587.
|
[3] |
SERJANTOW A Anonym zing censorship resistant systems[A]. Proc of the lst Int Peer-to-Peer Systems Workshop[C]. London, 2002. 111-120.
|
[4] |
GOLDSCHLAG D , REED M , SYVERSON P . Onion routing for anonymous and private Internet connections[J]. Communications of the ACM, 1999,42(2): 39-41.
|
[5] |
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second–generation onion router[A]. Proc of the 13th USENIX Security Symp[C]. Berkeley:USENIX Association, 2004. 303-320.
|
[6] |
陈周国, 蒲石, 祝世雄 . 匿名网络追踪溯源综述[J]. 计算机研究与发展, 2012,49(S2): 111-117. CHEN Z G , PU S , ZHU S X . Traceback technology for anonymous network[J]. Journal of Computer Research and Development, 2012,49(S2): 111-117.
|
[7] |
REITER M K , RUBIN A D . Crowds:anonymity for Web transactions[J]. ACM Trans on Information and System Security, 1998,1(1): 66-92.
|
[8] |
FREEDMAN M J , MORRIS R . Tarzan:a peer-to-peer anonym zing net-work layer[A]. Proc of the 9th ACM Conf on Computer and Communications Security[C]. New York,USA, 2002. 193-206.
|
[9] |
DANEZIS G,DINGLEDINE R,MATHEWSON N . Mixminion:design of a type III anonymous remailer protocol[A]. Proc of the 2003 IEEE Symp on Security and Privacy[C]. Washington,IEEE Computer Society, 2003. 2-15.
|
[10] |
SHERWOOD R , BHATTACHARJEE B , SRINIVASAN A . P5:a protocol for scalable anonymous communication[J]. Journal of Computer Secu-rity, 2005,13(6): 839-876.
|
[11] |
CHAUM D . The dining cryptographer’s problem:unconditional sender and recipient untraceability[J]. Journal of Cryptology, 1988,1(1): 65-75.
|
[12] |
陆天波 . P2P匿名通信协议WonGoo研究[D]. 北京:中国科学院大学, 2006. LU T B . Research on WonGoo—A Peer-to-Peer Anonymous Communication Protocol[D]. Beijing:Chinese University Academy of Sciences, 2006.
|
[13] |
刘鑫 . 基于 Tor 网络的匿名通信研究[D]. 上海:华东师范大学, 2011. LIU X . Research on Anonymous Communication Based on Tor Network[D]. Shanghai:East China Normal University, 2011.
|
[14] |
杨元原 . 一种混合的Tor通信系统方案[D]. 西安:西安电子科技大学, 2007. YANG Y Y . A Mixed Tor Anonymous Communication System Scheme[D]. Xi’an:Xi’an University of Electronic Science and Technology, 2007.
|
[15] |
吴振强, 周彦伟, 乔子芮 . 一种可控可信的匿名通信方案[J]. 计算机学报, 2010,33(9): 1686-1702. WU Z Q , ZHOU Y W , QIAO Z R . A controllable and trusted anonymous communication scheme[J]. Chinese Journal of Computers, 2010,33(9): 1686-1702.
|
[16] |
周彦伟, 吴振强, 蒋李 . 分布式网络环境下的跨域匿名认证机制[J]. 计算机应用, 2010,30(8): 2120-2124. ZHOU Y W , WU Z Q , JIANG L . Cross-domain mecha-nismof anonymous attestation for distributed network[J]. Journal of Computer Applications, 2010,30(8): 2120-2124.
|
[17] |
周彦伟, 吴振强, 乔子芮 . 可信匿名接入认证协议的研究与设计[J]. 计算机工程, 2011,37(5): 143-145. ZHOU Y W , WU Z Q , QIAO Z R . Research and design of trusted anonymous authentication protocol[J]. Computer Engineering, 2011,37(5): 143-145.
|
[18] |
林闯, 田立勤, 王元卓 . 可信网络中用户行为可信的研究[J].计算机研究与发展.2008,45(12):2033 -2043. LIN C , TIAN L Q , WANG Y Z . Research on user behavior trust in trustworthy network[J]. Journal of Computer Research and Development, 2008,45(12): 2033-2043.
|
[19] |
刘巍伟, 韩臻, 沈昌祥 . 基于终端行为的可信网络连接控制方案[J]. 通信学报, 2009,30(11): 127-134. LIU W W , HAN Z , SHEN C X . Trusted network connect control based on terminal behavior[J]. Journal on Communications, 2009,30(11): 127-134.
|
[20] |
吴振强 . 匿名技术的抗攻击性研究[J]. 陕西师范大学学报(自然科学版), 2004,32(1): 29-32. WU Z Q . Anonymous communications for attack resistant[J]. Journal of Shaanxi Normal University (Natural Science Edition), 2004,32(1): 29-32.
|
[21] |
REITER M K , RUBIN A D . Crowds:anonymity for Web transactions[J]. ACM Transactions on Information and System Security, 1998,1(1): 62-92.
|
[22] |
吴振强, 周彦伟, 马建峰 . 物联网安全传输模型[J]. 计算机学报, 2011,34(8): 1351-1364. WU Z Q , ZHOU Y W , MA J F . A security transmission model for Internet of things[J]. Chinese Journal of Computers, 2011,34(8): 1351-1364.
|