期刊文献+

UGC^3:一种抵御审查的隐蔽通信方法 被引量:2

UGC^3:a covert communication method defense against censorship
下载PDF
导出
摘要 提出了一种基于UGC站点的抗审查通信方法 UGC3,该方法利用已有的网络设施(UGC站点)组成一个全分布式的重叠网络,为了在资源的发布者和接收者之间交换信息,设计了一个高效的资源发现算法来协商资源的发布者和接收者之间的约会地点,利用信息隐藏的方法把目标资源隐藏到掩体媒介,发布到协商好的站点。最后分析了系统的安全性。 A UGC-based covert communication method: UGC3 was presented, which used fixed infrastructure (UGC sites) to form a fully distributed overlay. To exchange information between sender and receiver, an efficient resource discovery algorithm was proposed to negotiate the rendezvous; and then the targeted resource was published in the corresponding user-generated content hosts using information hiding method. Finally, the security properties were discussed
出处 《通信学报》 EI CSCD 北大核心 2012年第8期155-161,共7页 Journal on Communications
基金 国家自然科学基金资助项目(61100174) 国家高技术研究发展计划("863"计划)基金资助项目(2011AA010701)~~
关键词 隐蔽通信 抗审查 UGC站点 covert communication censorship-resistant UGC site
  • 相关文献

参考文献1

二级参考文献2

共引文献6

同被引文献18

  • 1屈志毅,苏文洲,赵玲.一种基于信息分散算法的分布式数据存储方案[J].计算机应用,2006,26(5):1102-1105. 被引量:13
  • 2吴成宾,朱彬.基于MQ的文件分片传输系统的设计与实现[J].电子科技大学学报,2007,36(3):646-648. 被引量:5
  • 3谢安,李冬红.概率论与数理统计[M].北京:清华大学出版社,2012:7-15.
  • 4Rios R, Onieva J A, Lopez J. Covert communications through network configuration messages[J]. Computers & Security,2013,39:34-46.
  • 5Cabuk S, Brodley C E, Shields C, et al. IP covert timing channels: design and detection[C]//Proceedings of the 11th ACM Conference on Computer and Communications Security. New York: ACM,2004:178-187.
  • 6Archibald R, Ghosal D. A covert timing channel based on fountain codes[C]//2012 IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK,2012:970-977.
  • 7Zhang Z, Guo Z, Yang Y. Bounded-reorder packet scheduling in optical cut-through switch[C]//2013 IEEE INFOCOM. Turin, Italy,2013:701-709.
  • 8Narasiodeyar R M, Jayasumana A P. Improvement in packet-reordering with limited re-sequencing buffers: an analysis[C]//2013 IEEE Conference on Local Computer Networks. Sydney, Australia,2013:416-424.
  • 9Liu Y, Ghosal D, Armknecht F, et al. Robust and undetectable steganographic timing channels for i.i.d. traffic[C]//Information Hiding Conference. Calgary, Canada,2010:193-207.
  • 10Giustiniano D, Lenders V, Schmitt J B, et al. Detection of reactive jamming in DSSS-based wireless networks[C]//Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. Budapest, Hungary,2013:43-48.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部