匿名通信系统中重路由及分级匿名技术研究

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

中南大学博士学位论文匿名通信系统中重路由及分级匿名技术研究姓名:徐红云申请学位级别:博士专业:计算机应用技术指导教师:陈建二;陈松乔20051101匿名通信系统中重路由及分级匿名技术研究作者:徐红云学位授予单位:中南大学参考文献(170条)1.AndreasPfitzmann.MaritKohntoppAnonymity,Unobservability,andPseudonymity:AProposalforTerminology.Draft,version0.1720002.MKReiter.ADRubinCrowds:AnonymityforWebTransaction1998(01)3.OBerthold.APfiztmann.RStandtkeTheDisavantagesofFreeMIXRoutesandHowtoOvercomeThem20014.ClaudiaDíaz.StefaanSeys.JorisClaessens.BartPreneelTowardsmeasuringanonymity20025.YongGuanOnCountermeasuresofTrafficAnalysisAttacks20026.ChaumDUntraceableelectronicmail,returnaddresses,anddigitalpseudonyms1981(02)7.RENewmanWolf.BalajiRVenkatramanHighLevelPreventionofTrafficAnalysis19918.RENewmanWolf.BalajiRVenkatramanPerformanceAnalysisofaMethodforHighLevelPreventionofTrafficAnalysis19929.RENewmanWolf.BalajiRVenkatramanPerformanceAnalysisofaMethodforHighLevelPreventionofTrafficAnalysisUsingMeasurementsfromaCampusNetwork199410.YongGuan.XinwenFu.RiccardoBettati.WeiZhaoAnoptimalstrategyforanonymouscommunicationprotocols200211.DChaumTheDiningCryptographersProblem,UnconditionalSenderandRecipientUntraceability1988(01)12.MichaelWaidner.BirgitPfitzmannThediningcryptographersinthedisco:unconditionalsenderandrecipientuntraceabilitywithcomputationallysecureserviceability199013.MichaelWaidnerUnconditionalsenderandrecipientuntraceabilityinspiteofactiveattacks198914.DavidMichaelMartinJRLocalAnonymityintheInternet199915.AJMenezes.PCvanOrschot.SAVanstoneHandbookofAppliedCryptography199616.BSchneierAppliedCryptography:Protocols,AlgorithmsandSourceCodeinC199417.WDiffie.MHellmanNewdirectionsincryptography197618.LuisvonAhn.AndrewBortz.NicholasJHopperk-AnonymousMessageTransmission200319.PhilippeGolle.AriJuelsDiningCryptographersRevisited200420.JBos.BdenBoerDetectionofdisruptersintheDCprotocol21.RobSherwood.BobbyBhattacharjee.AravindSrinivasanp5:AProtocolforScalableAnonymousCommunication200222.GulcuC.TsudikGMixingEmailwithBabel199623.PhilippeGolle.AriJuelsParallelMixing200424.Anonymizer25.GeorgeDanezis.RogerDingledine.NickMathewsonMixminion:DesignofaTypeⅢAnonymousRemailerProtocol200326.AnonymousRemailer查看详情27.DGoldschlag.MReed.PSyversonOnionRoutingforAnonymousandPrivateInternetConnections1999(02)28.PaulSyverson.MichaelReed.DavidGoldschlagOnionRoutingAccessConfigurations200029.PaulSyverson.GeneTsudik.MichaelReed.CarlLandwehrTowardsanAnalysisofOnionRoutingSecurity200030.PSyverson.DGoldschlag.MReedAnonymousConnectionsandOnionRouting199731.CShields.BNLevineAProtocolforAnonymousCommunicationovertheInternet200032.AdamBack.IanGoldberg.AdamShostackFreedomSystems2.1SecurityIssuesandAnalysis200133.PhilippeBoucher.AdamShostack.IanGoldbergFreedomSystems2.0Architecture200034.IanGoldberg.AdamShostackFreedomnetwork1.0architectureandprotocols200135.IanClarke.OskarSandberg.BrandonWiley.TheodoreWHongFreenet:ADistributedAnonymousInformationStorageandRetrievalSystem200036.MichaelJFreedman.RobertMorrisTarzan:APeer-to-PeerAnonymizingNetworkLayer200237.SharadGoel.MarkRobson.MiloPolte.EminGunSirerHerbivore:AScalableandEfficientProtocolforAnonymousCommunication38.RogerDingledine.NickMathewson.PaulSyversonTor:TheSecond-GenerationOnionRouter200439.EranGabber.PhillipBGibbons.DavidMKristol.YossiMatiasAlainMayerConsistent,YetAnonymous,WebAccesswithLPWA40.EGabber.PGibbons.YMatias.AMayerHowtomakepersonalizedWebbrowsingsimple,secure,andanonymous199741.AndreasPfitzmann.MichaelWaidnerNetworksWithoutUserObservability198742.AndreasPfitzmann.MichaelWaidnerNetworksWithoutUserObservability-DesignOptions198543.AndreasPfitzmann.BirgitPfitzmann.MichaelWaidnerISDN-mixes:Untraceablecommunicationwithverysmallbandwidthoverhead199144.AndreiSerjantov.RogerDingledine.PaulSyversonFromaTrickletoaFlood:ActiveAttacksonSeveralMixTypes200245.AndreiSerjantov.RichardENewmanOntheAnonymityofTimedPoolMixes200346.UlfMoller.LanceCottrell.PeterPalfrader.LenSassamanMixmasterProtocol-Version2(Draft)200347.DoganKesdogan.JanEgner.RolandBüschkesStop-and-GoMIXes:ProvidingProbabilisticAnonymityinanOpenSystem199848.MarcRennhard.BernhardPlattnerIntroducingMorphMix:Peer-to-PeerbasedAnonymousInternetUsagewithCollusionDetection200249.DavidMGoldschlag.MichaelGReed.PaulFSyversonHidingRoutingInformation199650.IClarke.OSandberg.BWiley.TWHongFreenet:ADistributedAnonymousInformationStorageandRetrievalSystem200151.IanGoldbergAPseudonymousCommunicationsInfrastructurefortheInternet200052.JeanFrancoisRaymondTrafficAnalysis:Protocols,Attacks,DesignIssues,andOpenProblems200053.SBoucher.ECotler.SLarsonInternetWiretappingandCarnivore200254.CERTmstreamDistributedDenialofServiceTool200055.XinwenFu.YeZhu.BryanGraham.RiccardoBettatiWeiZhaoOnFlowMarkingAttacksinWirelessAnonymousCommunicationNetworks200556.AdamBackHashcash199757.BNLevine.MKReiter.ChenxiWang.MWrightTimingAttacksinLow-LatencyMixSystems200458.YeZhu.XinwenFu.BryanGraham.RiccardoBettatiandWeiZhaoOnFlowCorrelationAttacksandCountermeasuresinMixNetworks200459.AndreiSerjantov.PeterSewellPassiveAttackAnalysisforConnection-BasedAnonymitySystems200360.OliverBerthold.HeinrichLangosDummyTraff

1 / 118
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功