期刊文献+

S-Crowds匿名通信协议的性能研究 被引量:2

Research on performance of S-Crowds anonymous communication protocol
下载PDF
导出
摘要 重路由机制是匿名通信系统的重要实现方法,文中介绍了重路由匿名通信系统的模型和Crowds系统的原理,提出了一种新型的S-Crowds协议,并对S-Crowds匿名通信系统的负载性能和匿名性能进行了详细的数学计算和理论推导,结果表明,S-Crowds系统在大幅提高系统匿名性的同时仅少量增加系统负载,是一种具有可靠匿名性的重路由协议。 The rerouting mechanism is the main kind of the method to establish an anonymous communication system. This article introduces the model of the rerouting-based anonymous communication system and the theory of the crowds, and proposes a new kind of rerouting protocol named S-Crowds.Through critical calculating and theory reasoning of the S-Crowds anonymous communication payload and anonymity performances, the S-Crowds protocol can be used to highly improve the system's anonymity with the cost of a little increase of payload, and the rerouting-protocol has great anonymity performance.
出处 《海军工程大学学报》 CAS 北大核心 2008年第2期109-112,共4页 Journal of Naval University of Engineering
关键词 匿名通信 重路由 匿名性 anonymous communication rerouting anonymity
  • 相关文献

参考文献4

  • 1REED M, SYVERSON P, GOLDSCHLAG D. Anonymous connections and onion routing [J]. IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection, 1998,16(4):482-494.
  • 2REITER M K, RUBIN A D, Crowds: anonymity for web transactions[J]. ACM Transactions on Information and System Security, 1998,1(1):66-92.
  • 3SHIELDS C, LEVINE B N. A protocol for anonymous communication over the Internet [C]. Proc. 7th ACM Conf. Computer and Communication Security, New York: ACM Press, 2000.
  • 4眭鸿飞,陈松乔,陈建二,王建新,王伟平.基于重路由匿名通信系统的负载分析[J].软件学报,2004,15(2):278-285. 被引量:19

二级参考文献1

共引文献18

同被引文献44

  • 1杜秀娟,金志刚.M^2ASR——新型多径匿名源路由协议[J].计算机应用研究,2009,26(3):1018-1021. 被引量:2
  • 2王继林,伍前红,陈德人,王育民.匿名技术的研究进展[J].通信学报,2005,26(2):112-118. 被引量:16
  • 3陆天波,方滨兴,孙毓忠,程学旗.点对点匿名通信协议WonGoo的性能分析[J].计算机工程,2006,32(2):26-28. 被引量:5
  • 4Yuan J, Lu J F. The research and application of terminal using in ve- hicle network[ C ]//Electronics Information and Emergency Communi- cation," Proceedings 2013 IEEE 4th International Conference on, IEEE ,2013:305 - 308.
  • 5Sood M, Kanwar S. Clustering in MANET and VANET: A survey [ C ]//Circuits, Systems, Communication and Information Technology Applications( CSCITA ), 2014 International Conference on, IEEE, 2014:375 - 380.
  • 6Chen X, Makki K, Yen K, et al. Sensor network security: a survey [J]. Communications Surveys & Tutorials, IEEE, 2009,11 (2) :52-73.
  • 7Chaum D L. Untraceable electronic mail, return addresses, and digital pseudonyms [ J]. Communications of the ACM, 1981,24 (2) : 84 -90.
  • 8Golle P, Jakobsson M, Juels A, et al. Universal re-encryption for Mix- nets[ M]//Topics in Cryptology-CT-RSA, Springer Berlin Heidelberg, 2004:163 - 178.
  • 9Gomulkiewicz M, Klonowski M, Kutylowski M. Onions based on universal re-encryption-anonymous communication immune against repetitive attack [M ]//Information Security Applications, Springer Berlin Heidelberg, 2005:400 - 410.
  • 10Goldschlag D, Reed M, Syverson P. Onion muting [ J ]. Communica- tions of the ACM, 1999,42(2) :39-41.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部