期刊文献+

基于数字水印的网络可控匿名通讯系统研究

Application of Digital Watermarking in Network Anonymous Communication
下载PDF
导出
摘要 随着互联网技术的不断发展,网络匿名通讯技术的研究与应用提供了一个保护用户隐私、保密通讯内容的重要手段,同时也为进行非法通信进而威胁网络信息安全开了通路。论文研究匿名通讯系统的可控性,通过对数字水印的特点分析给出使用数字水印技术构建可控匿名通讯系统的方法和优点。 As the development of network technology, the research and application on network anonymous communication protect consumer' s privacy and content of communication, and use this technology the illegal communications can threaten to network information security. The paper researches on controllable of network anonymous communication, gives a method which description how to build a controlled anonymous communication systems using the technology of digital watermarking.
出处 《微计算机信息》 北大核心 2005年第11X期17-20,共4页 Control & Automation
基金 国家计算机信息内容安全重点实验室基金资助
关键词 匿名通讯 用户隐私 数字水印 信息安全 可控性 互联网 Anonymous communication, Consume' s privacy, Digital Watermarking, Information Security, controllable
  • 相关文献

参考文献10

二级参考文献50

  • 1[1]The anonymizer[EB/OL].http://www.anonymizer.com.
  • 2[2]MICHAEL K,AVIEL A,RUBIN D.Crowd:Anonymity for Web transcations[EB/OL].http://www.research.att.com/ projects/ crowds/papers/j8.pdf.
  • 3[3]REED M G,SYVERSON P F.Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communication- Special Issue on Copyright and Privacy Protection,1998,16(4):482-494.
  • 4[4]GOLDSCHLAG D M,REED M G,SYVERSON P F.Hiding routing information[A].Information Hiding,Proceedings[c].Springer Verlag,LNCS,1996.1174:137-150.
  • 5[5]HOWARD J D.An analysis of security incidents on the internet [D].Camegie Mellon University,1988.
  • 6[6]SAVAGE S,WETHERALL D,KARLIN A.Practical network support for IP traceback[A].Proceedings of the 2000 ACM SIGCOMM Conference[C].August 2000.
  • 7[7]SONG D X,PERRIG A.Advanced and authenticated marking schemes for IP traceback[R].California: Computer Science Division (EECS),University of California,2000.
  • 8[8]Computer Emergency Response Team.Cert advisory CA-96.26 denial-of-service attack via pings[EB/OL].http://www.cert.org/ advisories/CA-96.26.ping.html,1996-11.
  • 9[9]Computer Emergency Response Team.Cert advisory ca-2000-01 denial-of-service developments[EB/OL].http://www.cert.org/ advisories/CA-2000-01.html,2000.
  • 10[10]MOORE D,VOELKER G M,SAVAGE S.Interring internet denial-of-service activity[A].Proceedings of the 10th USENIX Security Symposium[C].August 2001.

共引文献225

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部