期刊文献+

互联网匿名通信及其军事应用 被引量:1

Internet Anonymous Communication and Its Military Application
下载PDF
导出
摘要 匿名是通信网络上保护信息安全的一种有效手段。介绍了匿名通信的概念和分类,分析了目前匿名通信技术的研究动态,包括Mix,Onion Routers,Crowds,Dining Cryptograph和T or。在此基础上,给出了匿名通信技术在军事领域的应用实例WonGoo,WonGoo通过分层加密和随机转发取得了强匿名和高效率。最后,对匿名通信在军事应用上进行了展望。 The anonymous communication has played an important role to protect information se- curity. Firstly, the correlative concept and the classifying method of anonymous communications are introduced. Then, research trends of the existing anonymous communication technology are analyzed, including Mix, Onion Routers, Crowds, Dining Cryptograph,and Tor. On this basis, the application cases of WonGoo, a general model of anonymous communication system, in the military area are given. WonGoo can provide strong anonymity and high efficiency with layered encryption and random forwarding. Finally, the prospect of the anonymous communication in the military application is pointed out.
作者 李玲玲
出处 《指挥信息系统与技术》 2013年第5期51-56,共6页 Command Information System and Technology
关键词 匿名 信息安全 匿名通信技术 anonymity information security anonymous communication technology
  • 相关文献

参考文献11

  • 1Pftzmann A,Kóhntopp M. Anonymity,unobservability and pseudonymity:a proposal for terminology[A].New York:springer-verlag,2001.1-9.
  • 2Shields C,Levine B. A protocol for anonymous communication over the Internet[A].Athens:ACM,2000.33-42.
  • 3Fu Chong,Xiong Hu,Qian Weizhong. A dynamic group-based scheduling method for low-latency anonymous communication systems[A].Chengdu:IEEE,2010.193-197.
  • 4章敬崇,唐旭,孙宇.Crowds匿名通信系统研究[J].微计算机信息,2012(7):128-130. 被引量:2
  • 5刘鑫,王能.匿名通信综述[J].计算机应用,2010,30(3):719-722. 被引量:13
  • 6Chaum D. Untraceable electronic mail,return addresses and digital pseudonyms[J].Communications of the ACM,1981,(02):84-88.
  • 7God S,Robson M,Polte M. Herbivore:a scalable and efficient protocol for anonymous communication[M].Ithaca:Cornell University,2003.
  • 8Reiter M,Rubin A. Crowds:anonymity for Web transactions[J].ACM Transactions on Information and System Security,1998,(01):62-92.
  • 9Chaum D. The Dinning Cryptographers problem:unconditional sender and recipient untraceability[J].Journal of Cryptology,1998,(01):65-75.
  • 10Lu Tianbo,Fang Bingxing,Sun Yuzhong. WonGoo:a peer-to-peer protocol for anonymous communication[A].Las Vegas:CSCREA,2004.1102-1106.

二级参考文献32

  • 1吴艳辉,陈建二,王伟平.匿名通信系统中时间攻击模型研究[J].计算机工程与应用,2005,41(23):25-26. 被引量:1
  • 2眭鸿飞,陈建二,陈松乔,朱娜斐.重路由匿名通信系统中基于秘密共享的重路由算法[J].计算机研究与发展,2005,42(10):1660-1666. 被引量:7
  • 3朱娜斐,陈松乔,眭鸿飞,陈建二.匿名通信概览[J].计算机应用,2005,25(11):2475-2479. 被引量:4
  • 4高智世.一种改进的混合匿名通信系统[J].微计算机信息,2005,21(11X):27-29. 被引量:2
  • 5CHAUM D L.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM 1981,24(2):84-88.
  • 6DOUGLAS K.A taxonomy for and analysis of anonymous communications networks[D].Ohio:Air Force Institute of Technology,2009.
  • 7REED M G,SYVERSON P F,GOLDSCHLAG D M.Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communications,1998,16(4):482-494.
  • 8BANSOD N,MALGI A,CHOI B K,et al.MuON:Epidemic based mutual anonymity[C]// Proceedings of the 13th IEEE International Conference on Network Protocol.Boston,MA:IEEE Computer Society,2005:99-109.
  • 9HAN JIN-SONG,LIU YUN-HAO.Rumor riding:Anonymizing unstructured peer-to-peer systems[C]// Proceedings of the 14th IEEE International Conference on Network Protocol.Santa Barbara,CA:IEEE Computer Society,2006:22-31.
  • 10SERJANTOV A.Anonymizing censorship resistant systems[C]// IPTPS 2002:Proceedings of the 1st International Peer to Peer Systems Workshop.London:Springer,2002:111-120.

共引文献17

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部