期刊文献+

P2P匿名通信研究综述 被引量:1

Research on P2P Anonymous Communication
下载PDF
导出
摘要 在传统匿名通信技术的基础上,引入P2P结构作为匿名网络的底层架构,使得匿名系统具有更好的可伸缩性.由于P2P网络具有分散化、可扩展性和健壮性好、高性能等优点,因此在实际中得到了广泛的应用.全面综述了P2P匿名通信的核心技术,研究现状以及当前面临的挑战,同时展望了未来的发展方向. Peer-two-Peer anonymous communication systems taking p2p as infrastructure,can make the anonymous system more flexible.The P2P network has virtues such as distributing,expanding and high performance for extensive application in practice.The core technique of P2P anonymous communication,the present research condition and challenge,the future development are overviewed.
作者 杨懋 霍成义
出处 《兰州工业高等专科学校学报》 2009年第5期11-14,共4页 Journal of Lanzhou Higher Polytechnical College
关键词 网络安全 P2P网络 匿名通信 重路由 network security P2P networks anonymous communication rerouting
  • 相关文献

参考文献5

  • 1霍成义,吴振强.重路由匿名通信系统中前驱攻击模型研究[J].计算机工程与设计,2008,29(5):1083-1085. 被引量:1
  • 2Yong Guan, Xinwen Fu, Rieeardo Bettati, Wei Zhao. An Optimal Strategy for Anonymous Communication Protocols. In Proc. 22nd IEEE International Conference on Distributed Computing Systems (ICDCS 2002)[M]. Jul, 2002.
  • 3Michael J. Freedman and Robert Morris. Tarzan:A Peer-to-Peer Anonymizing Network Layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), 2002. 193-206.
  • 4Rob Sherwood, Bobby hattacharjee, and Aravind Srinivasan. P5 : A Protocol for Scalable Anonymous Communication. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 2002.58-70.
  • 5霍成义,吴振强.双向匿名通信协议的研究与设计[J].计算机工程,2008,34(19):174-175. 被引量:5

二级参考文献17

  • 1眭鸿飞,陈建二,陈松乔,朱娜斐.重路由匿名通信系统中基于秘密共享的重路由算法[J].计算机研究与发展,2005,42(10):1660-1666. 被引量:7
  • 2吴艳辉,王伟平.基于重路由的匿名通信系统研究[J].计算机工程与应用,2006,42(17):19-21. 被引量:5
  • 3吴振强,马建峰.一种无线Ad Hoc网络动态混淆匿名算法[J].计算机研究与发展,2007,44(4):560-566. 被引量:8
  • 4Guan Y, Fu X, Bettati R. An optimal strategy for anonymous communication protocols[C]. 22nd Intemational Conference on Distributed Computing Systems. Los Alamitos: IEEE Computer Science Press, 2002:257-266.
  • 5Goldschlag D, Reed M, Syverson P. Onion routing for anonymous and private Intemet connections[J]. Communications of the ACM, 1999,42(2):39-41.
  • 6Reiter M K, Rubin A D. Crowds: Anonymity for web transactions[J]. ACM Trans Information and System Security, 1998(1): 66-92.
  • 7Shields C, Levine B N. A protocol for anonymous communication over the Intemet [C]. Proc 7th ACM Conf Computer and Communication Security. New York: ACM Press,2000:33-42.
  • 8Freedman M J, Morris R. Tarzan: A peer-to-peer anonymizing network layer [C]. Washington, DC: The 9th ACM Conf Computer and Communications Security, 2002:193-206.
  • 9Rennhard M, Plattner B. Introducing MorphMix: peer-to-peer based anonymous Intemet usage with collusion detection [C]. Washington, DC, USA: The Workshop on Privacy in the Electronic Society, 2002:91-102.
  • 10Matt Wright, Micah Adler, Brian N Levine, et al. An analysis of the degradation of anonymous protocols [C]. San Diego, Califomia: ISOC Network and Distributed System Security Sympo- sium,2002.

共引文献4

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部