[1] |
CHAUM D . Untraceable electronic mail,return addresses,and digital pseudonyms[J]. Communications of the ACM, 1981,24(2): 84-88.
|
[2] |
MOLLER U , COTTRELL L , PALFRADER P . Mixmaster protocol-version 2[EB/OL]. , 2003.
|
[3] |
DANEZIS G , DINGLEDINE R , MATHEWSON N . Mixminion:design of a type III anonymous remailer protocol[A]. Proceedings of the 2003 IEEE Symposium on Security and Privacy[C]. Oakland,California,USA, 2003. 2-15.
|
[4] |
KESDOGAN D , EGNER J , BUSCHKES R . Stop-and-go MIXes:providing probabilistic anonymity in an open system[A]. Proceedings of Information Hiding Workshop(IH 1998)[C]. Portland,Oregon,USA, 1998. 83-89.
|
[5] |
GOLLE P , JAKOBSSON M , JUELS A . Universal re-encryption for mixnets[A]. Proceedings of the 2004 RSA Conference,Cryptographer's Track[C]. San Francisco,USA, 2004. 163-178.
|
[6] |
GOMULKIEWICZ M , KLONOWSKI M . Onions based on universal reencryption anonymous communication immune against repetitive attack[A]. International Workshop on Information Securty Applications(WISA04)[C]. Jeju Island,Korea, 2004. 400-410.
|
[7] |
DANEZIS G . Breaking four mix-related schemes based on universal re-encryption[A]. Proceedings of Information Security Conference 2006(ISC 2006)[C]. Samos,Greece, 2006. 46-59.
|
[8] |
KLONOWISKI M , KUTYLOWSKI M , LAUKS A . Repelling detour attack against onions with re-encryption[A]. Proceedings of International Conference on Applied Cryptography and Network Security 2008(ACNS 2008)[C]. New York,USA, 2008. 296-308.
|
[9] |
BORISOV N , KLONOWISKI M , MIROSLAW K . Attacking and repairing the improved ModOnions protocol[A]. Proceedings of the 12th International Conference on Information Security and Cryptology[C]. Seoul,Korea, 2009. 258-273.
|
[10] |
BORISOV N , KLONOWISKI M , MIROSLAW K . Attacking and repairing the improved ModOnions protocol-tagging approach[J]. KSII Transactions on Internet and Information Systems, 2010,4(3): 380-399.
|
[11] |
陆天波, 秦宝山, 李洋 . 重加密匿名通道WGRe[J]. 通信学报, 2009,30(4):66-73. LU T B , QIN B S , LI Y . WGRe:a re-encryption anonymous tunnel[J]. Journal on Communications, 2009,30(4):66-73.
|
[12] |
时金桥, 方滨兴, 郭莉 . 抵御 MIX重放攻击的混合结构消息报文机制[J]. 通信学报, 2009,30(3):21-26. SHI J Q , FANG B X , GUO L . Hybrid-structured onion scheme against replay attack of MIX[J]. Journal on Communications, 2009,30(3):21-26.
|
[13] |
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second-generation onion router[A]. Proceedings of the 13th USENIX Security Symposium[C]. San Antonio,USA, 2004. 303-320.
|
[14] |
CAMENISCH J , STADKER M . Efficient group signature schemes for large groups[A]. Proceedings of Crypto'97[C]. Santa Barbara,California,USA, 1997. 410-424.
|
[15] |
WANG Q Y , MITTAL P , BORISOV N . In search of an anonymous and secure lookup:attacks on structured peer-to-peer anonymous communication systems[A]. Proceedings of the ACM CCS 2010[C]. Chicago,Illinois,USA, 2010. 308-318.
|
[16] |
PFITZMANN B . Breaking efficient anonymous channel[A]. Proceedings of Eurocrypt'94[C]. Perugia,Italy, 1994. 332-340.
|
[17] |
LING Z , LUO J Z , YU W . A novel cell counter based attack against tor[A]. Proceedings of the ACM CCS 2009[C]. Chicago,Illinois,USA, 2009. 578-589.
|
[18] |
ZHU Y , FU X W , RICCARDO B , et al. Analysis of flow-correlation attacks in anonymity network[J]. International Journal of Security and Networks, 2007,2(1): 137-153.
|
[19] |
STEFAN S , SEBASTIAN C . Using linkability information to attack mix-based anonymity services[A]. Proceedings of 9th International Symposium on Privacy Enhancing Technologies[C]. Seattle,WA,USA, 2009. 94-107.
|