1 |
Alan O , Karlton P , Paul C . The SSL protocol version 3. Internet-Draft,IETF, 1996
|
2 |
Pfitzmann A , Kohntopp M . Federrath H (ed). Anonymity, unobservability and pseudonymity:a proposal for terminology.In: LNCS 2009, Springer-Verlag, Berlin Heidelberg, July 1996
|
3 |
Chaum D . Untraceable electronic mail,return addresses,and digital pseud-onyms. Communications of the ACM, 1981,4(2): 84~88
|
4 |
Chaum D . The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptography, 1988,1(1): 65~75
|
5 |
Berthold H , Kopsell S . Hnnes Federath (ed). Web mixes: a system for anonymous and unobservable Internet access.In: LNCS 2009, Springer-Verlag Heidelberg, July 2001
|
6 |
Goldschlag D , Reed M , Syverson P . Onion routing for anonymous and private Internet connections. Communications of the ACM, 1999,42(2): 39~41
|
7 |
Dolev S , Ostrovsky R . Xor-Trees for efficient anonymous multicast and reception. ACM Transaction on Information and System Security, 2000,3(2): 63~84
|
8 |
The Anonymizer,
|
9 |
Dingledine R , Mathewson N , Syverson P . TOR:the second-generation onion router.In: Proceedings of the 13th USENIX Security Symposium, Washington,DC,USA, August 1999
|
10 |
刘鑫, 赵红云, 王育民 等. 一个采用分段验证签密隐蔽路由的设计与实现. 电子学报 2002,30(7):995~998
|
11 |
Reiter M K , Rubin A D . Crowds: anonymity for web transactions. ACM Transaction on Information and System Security, 1998,1(1): 66~92
|
12 |
Freedman M J , Moris R . Tarzan: a peer to peer anonymizing network layer.In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS2002), Washington, DC, USA, November 1999
|
13 |
Remhard M , Plattner B . Introducing MorphMix:peer-to-peer based anony mous Internet usage with collusion detection.In: Proceedings of the Workshop on Privacy in the Electronic Society, Washington, DC, USA, November 2002
|
14 |
眭鸿飞, 陈松乔, 陈建二 等. 基于重路由匿名通信系统的负载分析. 软件学报, 2004,15(2):278~285
|
15 |
王伟平, 陈建二, 王建新 等. 基于组群的有限路长匿名通信协议. 计算机研究与发展, 2003,40(4):609~614
|
16 |
王伟平, 陈建二, 陈松乔 等. 匿名通信中短距离优先分组重路由方法的研究. 软件学报, 2004,15(4):561~614
|
17 |
Diaz C , Seys S , Claessens J , et al. Towards measuring anonymity.In: Workshop on Privacy Enhancing Technologies(PET2002), Springer-Verlag,LNCS 2482, San Francisco,CA, April 2002
|
18 |
Guan Yong , Fu Xinwen , Bettati R , et al. A quantitative analysis of anonymous communications. IEEE Transactions on Reliability, 2004,53(1):103~115
|
19 |
Shmatikov V . Probabilistic analysis of anonymity.In: Proceedings of 15th IEEE Computer Security Foundations Workshop(CSFW 2002), Cape Breton,Nova Scotia,Canada, June 2002
|
20 |
Wright M , Adler M , Levine B N , et al. Defending anonymous communication against passive logging attacks.In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (IEEE S&P 2003), Berkeley, CA, USA, May 2003
|