匿名通信系统性能及可扩展性研究

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

中南大学博士学位论文匿名通信系统性能及可扩展性研究姓名:王伟平申请学位级别:博士专业:计算机应用技术指导教师:陈建二;陈松乔20040501匿名通信系统性能及可扩展性研究作者:王伟平学位授予单位:中南大学被引用次数:2次参考文献(103条)1.参考文献2.StefanSavage.DavidWetherall.AnnaKarlinPracticalNetworkSupportforIPTraceback20003.查看详情4.AlanOFreier.PhilipKarlton.PaulCKocherTheSSLProtocolVersion319965.ChaumDUntraceableeletronicmail,returnaddresses,anddigitalpseudonyms1981(02)6.TheAnonymizer7.LucentPersonalWebAssistant8.GoldschlagD.ReedM.SyversonPOnionroutingforanonymousandprivateInternetconnections1999(02)9.ReedM.SyversonP.GoldschlagDAnonymousconnectionandonionrouting1998(04)10.TheFreedomNetwork11.BertholdHFederrath.SKopsellWebMIXes:ASystemforAnonymousandUnobservableInternetAccess200112.BertholdHFederrath.MKohntoppProjectAnonymityandUnobservabilityintheInternet200013.ClayShields.BrianNeilLevineAProtocolforAnonymousCommunicationOvertheInternet200014.MKReiter.ADRubinCrowds:AnonymityforWebTransactions1998(01)15.DavidChaumTheDiningCryptographersProblem:UnconditionalSenderandRecipientUntraceability1988(01)16.吴振强.杨波追踪洋葱包的高级标记方案与实现[期刊论文]-通信学报2002(5)17.吴振强.杨波基于葱头路由技术和MPLS的隐匿通信模型[期刊论文]-西安电子科技大学学报(自然科学版)2002(4)18.赵福祥.王常杰.王育民一个新的隐蔽网络实现方案及应用[期刊论文]-西安电子科技大学学报(自然科学版)2001(1)19.赵福祥.王育民.王常杰可靠洋葱路由方案的设计与实现[期刊论文]-计算机学报2001(5)20.赵福祥.赵红云.王育民.杨世平一个采用分段验证签密隐蔽路由的设计与实现[期刊论文]-电子学报2002(7)21.RSherwood.BBhattacharjee.ASrinivasanP5:AProtocolforScalableAnonymousCommunication200222.SharadGoel.MarkRobson.MiloPolteHerbivore:AScalableandEfficientProtocolforAnonymousCommunication,[TR2003-1890,CornellUniversity]200323.EminGunSirer.MiloPolte.MarkRobsonCliqueNet:ASelf-Organizing,Scalable,Peer-to-PeerAnonymousCommunicationSubstrate24.MichaelJFreedman.RobertMorrisTarzan:APeer-to-PeerAnonymizingNetworkLayer200225.StefanKopsell.SandraSteinbrecherModellingUnlinkability200326.ClaudiaDiaz.JorisClaessens.StefaanSeysInformationTheoryandanonymity200227.ClaudiaDiaz.StefaanSeys.JorisClaessensTowardsmeasuringanonymity200228.Serjantov.GDanezisTowardsanInformationTheoreticMetricforAnonymity200229.YGuan.XFu.RBettatiAnOptimalStrategyforAnonymousCommunicationProtocols200230.VShmatikovProbabilisticanalysisofanonymity200231.DominicHughes.VitalyShmatikov.InformationHidingAnonymityandPrivacy:AModularApproach2004(01)32.MWright.MAdler.BLevineAnAnalysisoftheDegradationofAnonymousProtocols200233.DGoldschlag.MReed.PSyversonOnionRoutingforAnonymousandPrivateIntemetConnections1999(02)34.MReed.PSyverson.DGoldschlagAnonymousConnectionandOnionRouting1998(04)35.MatthewGNaugleNetworkProtocols199936.JamesFKurose.KeithWRossComputerNetworking:ATop-DownApproachFeaturingtheInternet200137.AZTirkel.GARankin.RMvanSchyndelElectronicWaterMark199338.RGvanSchyndel.AZTirkel.NRAMeeADigitalWatermark199439.JJKO'Ruamaidh.FMBoland.OSinnenWatermarkingDigitalImagesforCopyrightProtection199640.MichaelJRyan.MichaelRFraterCommunicationsandInformationSystems200241.AndyDornan.刘璐.孙巍.姚德启第三代移动通信应用指南-从蜂窝系统到Wi-Fi200142.theAnonymousE-mailRemailerwebsite43.查看详情44.LCottrellMixmaster&RemailerAttacks45.RJAndersonTheEternityService46.MWaldman.ADRubin.LFCranorPublius:Arobust,tamper-evident,censorshipresistantwebpublishingsystem200047.PrivacyandAnonymityonInternet48.GroshCAnonymisationservicesforIPmulticast200049.DavidChaumBlindsignaturesforuntraceablepayments198250.JBoly.ABosselaers.RCramerTheESPRITProjectCAFE-HighSecurityDigitalPaymentSystems199451.GMedvinsky.BCNeumanNetCash:ADesignforPracticalElectronicCurrencyontheInternet199352.DM'RaihiCost-EffectivePaymentSchemeswithPrivacyRegulation199653.NetCash,NetCash(SM):AnonymousNetworkPayment54.RRivest.AShamirPayWordandMicroMint:TwoSimpleMicropaymentSchemes1996(01)55.MFranklin.MReiterThedesignandimplementationofasecureauctionservice[外文期刊]1996(05)56.HKikuchi.MHarkavy.JTygarMulti-roundAnonymousAuctionProtocols1999(04)57.KViswanathan.CBoyd.EdDawsonAthreephasedschemaforsealedbidauctionsystemdesign200058.BSchoenmakersAsimplepubliclyverifiablesecretsharingschemeanditsapplicationtoelectronicvoting199959.MStadler.J-MPiveteau.JCamenishFairBlindSignatures199560.HongfeiSui.JianxinWang.JianerChenAnanalysisofforwardingmechanisminCrowds200361.HannesFederrath.AnjaJerichow.DoganKesdoganSecurityinPublicMobileCommunicationNetworks199562.HannesFederrath.AnjaJerichow.AndreasPfitzmannMixesinmobilecommunicationsystems:Locationmanagementwithprivacy199663.HannesFederrathProtectioninMobileCommunications199964.王伟平.陈建二.王建新.眭鸿飞基于组群的有限路长匿名通信协议[期刊论文]-计算机研究与发展2003(4)65.IStoica.RMorris.DKargerChord:APeer-to-PeerLookupServiceforIntemetApplications200166.RCox.AMuthitacharoen.RMorrisServingDNSusingchord200267.Harchol-balterM.LeughtonT.LewinDResourcediscoveryindistributednetworks199968.BalensonD.McGrewD.ShermanAKeymanagementforlargedynamicgroups:One-wayfunctiontreesandamortizedinitialization200069.RodehO.BirmanK.DolevDOptimizedgrouprekeyforgroupcommunicationsystems200070.WeilerNSecureAnonymousGroupInfrastructureforCommonandFutureInternetApplications200171.WeilerNSEMSOMM--AScalableMultipleEncryptionSchemeforOne-To-ManyMulticast200172.WeilerN.PlattnerBSecureAnonymousProtocolsforLocalandMulticastEnvironments.[TIK,ETHZurich,Switzerl

1 / 111
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功