2Harkins, Carrel. The Intemet Key Exchange ( IKE ) [ S ]. RFC 2409, 1998-11.
3William Stallings.Cryptography and Network Security:Principles and Practice.
4CHAUM D. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981, 24(2):84-88.
5PFITZMANN A, KOHNTOPP M. Anonymity, unobservability and pseudonymity[EB/OL]. http://www.cert.org/IHW2001/terminology_proposal.pdf, 2003.
6SEYS S. Anonymity and privacy in electronic services[EB/OL].http://www.cosic.esat.kuleuven.ac.be/apes/docs/d2_final.pdf,2002.
7MALKHI D. Anonymity - Lecture Notes[R]. Advanced Course in Computer and Network Security, at the Hebrew University, Jerusalem.2002.
8KESDOGAN D, FEDERRATH H, JERICHOW A, PFITZMANN A.Location management strategies increasing privacy in mobile communication systems[A]. IFIP SEC'96,12th International Information Security Conference[C]. 1996. 39-48.
9CHAUM D. The dining cryptographers problem: unconditional sender and recipient untraceability[J]. Journal of Cryptology, 1988,1(1): 65-75.
10JAKOBSSON M. A practical mix[A]. EUROCRYPT '98, LNCS 1403[C]. Springer-Verlag, 1998. 448-461.