期刊文献+

N-path重路由匿名通信系统负载分析

Payload analysis of N-path rerouting-based anonymous communication system
下载PDF
导出
摘要 给出了对N-path重路由匿名通信系统成员负载的理论计算,研究了节点负载性能与路径可靠性的关系,分析了决定系统负载性能的主要因素。计算结果表明,节点负载取决于路径长度和可靠性需求的数学期望,管理员可通过配置这两个参数,平衡匿名系统的可靠性和负载特性,以适应不同需求。 The theoretical calculation of the participant payload was given, the relationship between the participant payload and the rerouting road's dependency was investigated, and the factors that decided the system payload performance were analyzed, The result shows that the determinants are the mathematical expectations of the road's length and the requested dependency, The system administrator can balance the payload and the dependencies to fit the different usages by configuring these two parameters.
作者 陶颋 孙乐昌
出处 《计算机应用》 CSCD 北大核心 2008年第3期626-628,共3页 journal of Computer Applications
关键词 匿名通信 重路由 负载分析 anonymous communication rerouting payload analysis
  • 相关文献

参考文献5

  • 1眭鸿飞,陈松乔,陈建二,王建新,王伟平.基于重路由匿名通信系统的负载分析[J].软件学报,2004,15(2):278-285. 被引量:19
  • 2REED M, SYVERSON P, GOLDSCHLAG D. Anonymous connections and onion touting[ J]. IEEE Journal ON Selected Areas in Communication Special issue on copyright and Privacy Protection, 1998; 16(4) : 482 - 494.
  • 3REITER M K, RUBIN A D. Crouds : anonymity for web transactions [ J]. ACM Transactions on Information and System Security, 1998, 1 (1) :66 -92.
  • 4SHIELDS C, LEVINE B N. A protocol for anonymous communication over the Internet[ C]//Proceedings of the 7th ACM Conference on Computer and Communications Security. New York: ACM Press, 2000:33 -42.
  • 5吴艳辉,王伟平.基于重路由的匿名通信系统研究[J].计算机工程与应用,2006,42(17):19-21. 被引量:5

二级参考文献7

  • 1Andreas Pfitzmann,Marit Kohntopp.Anonymity,unobservability,and pseudonymity:a proposal for term inology[C].In:Hannes Federrath Ed.Designing Privacy Enhancing Technologies:Design Issues in Anonymity and Observability,Springer Verlag,LNCS 2009,2000-07:129.
  • 2Reed M,Syverson P,Goldschlag D.Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection,1998;16(4):482~494.
  • 3Reiter M K,Rubin A D.Crowds:anonymity for web transactions[J].ACM Transactions on Information and System Security,1998; 1 (1):66~92.
  • 4Shields C,Levine B N.A protocol for anonymous communication over the Internet[C].In:Proc 7th ACM Conf Computer and Communication Security,New York:ACM Press,2000:33~42.
  • 5Freedman M J,Moris R Tarzan.A peer to peer Anonymizing Network Layer[C].In:Proceedings of the 9th ACM conference on computer and communications security(CCS2002),2002:193~206.
  • 6Motawani R,Raghavan P.Randomized Algorithms[M].Cambridge:Cambridge University Press,1995.
  • 7王伟平,陈建二,王建新,眭鸿飞.基于组群的有限路长匿名通信协议[J].计算机研究与发展,2003,40(4):609-614. 被引量:20

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部