期刊文献+

重路由匿名通信网络中延迟模型研究

Research of Networks Modeling and Performance Analysis Based on Anonymous Agent Overlay Networks
下载PDF
导出
摘要 重路由技术在匿名通信中得到广泛的应用,首先分析出在基于重路由技术的匿名通信系统中,由匿名代理所组成的应用层覆盖网络实际上是一个开环排队网络,引入Jackson开环排队网络模型和分析方法,对由匿名代理所组成的覆盖网络建立网络模型,性能参数分析;研究成果一方面为设计和研究匿名通信网络系统及性能分析提供理论依据,同时为研究基于延迟时间和时间同步机制的匿名通信跟踪技术提供一种新的思路. Rerouting technique is used wildly in anonymous communication. The paper at first arrives the conclusion that application overlay network is virtually an open queuing networks which is consisted of anonymous agents. Based on the analysis of rerouting technique, The paper builds up an anonymous agent overlay network model and analyzes its performance parameters by introducing Jackson open queuing networks model and its analysis methods. The result is useful not only for the person who researches and designs the anonymous communication system, but also for those who research anonymous communication tracking technique, because it gives them a new method and a theory basis concerned.
作者 程昊
出处 《微电子学与计算机》 CSCD 北大核心 2013年第10期138-143,共6页 Microelectronics & Computer
关键词 匿名代理覆盖网络 Jackson网络模型 性能分析 anonymousagent overlay network Jackson netwotk model performance analysis
  • 相关文献

参考文献14

二级参考文献31

  • 1F Bao,R H Deng.A new type of "Magic Ink" signatures-Towards transcript-irrelevant anonymity revocation[C].In:PKC'99,LNCS 1560, Springer-Verlag, 1999 : 1-11.
  • 2Yan Wang,Shuwang Lu,Zhenhua Liu.A Simple Anonymous Fingerprinting Scheme Based on Blind Signature{C].In:Information and Communications Seeurity(ICICS'03),LNCS 2836,Springer-Vedag,2003: 260-268.
  • 3Goldschlag D, Reed M ,Syverson P.Onion routing for anonymous and private Internet connections[J].Communications of the ACM, 1999;42 (2) :39-41.
  • 4A Shamir.How to share a secret[J].Communicafions of ACM,1979; 22:612-613.
  • 5Sharad Goel,Mark Robson,Milo Polte et al.Herbivore:A Scalable and Efficient Protocol for Anonymous Corranunication[M].TR2003-1890, Comell University, 2003-02.
  • 6Brian Neil Levine,Michael Reiter,Chenxi Wang et al.Stopping Timing Attacks in Low-Latency Mix-Based Systems[C].In:Proc Financial Cryptography, 2004-02.
  • 7David M'Raihi,David Pointcheval.Distributed Trustees and Revocability:A Framework for Internet Payment[C].In:Financial Cryptography, 1998 : 28-42.
  • 8F Zhang,F T Zhang,Y Wang.Fair electronic cash systems with multiple banks[C].In : SEC :2000, Kluwer, 2000 : 461-470.
  • 9G Davida,Y Frankel,Y Tsiounis et al.Anonymity control in E-cash systems[C].In :Rafael Hirschfeld ed.Financial Cryptography :First International Conference,FC "97,volume 1318 of Lecture Notes in Computer Science,Anguilla,British West Indies,Springer-Verlag,1997: 1-16.
  • 10Camenisch J,Maurer U,Stadler M.Digital payment systems with passive anonymity-revoking trustee[C].In:Bertino Eetal eds.Lecture Notesin Computer Science, 1146,Berlin:Springer-Verlag, 1996:33-43.

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部