期刊文献+

匿名通信技术现状分析与展望 被引量:1

Analysis and Prospect of Anonymous Communication Technology
下载PDF
导出
摘要 随着流量审查技术的不断演进,传统的加密通信技术在隐藏数据特征方面显示出固有的缺陷。为了应对审查,多种技术手段应运而生,其中匿名通信技术凭借其独特的设计理念显现出巨大的发展潜力。为深入探讨匿名通信技术未来的发展方向,采用文献研究法、实验研究法和定性分析法,对现有的匿名通信技术的实现方法进行了分析和归纳,发现现有技术存在被审查者识别的风险。基于此,提出了匿名通信技术未来的发展方向以及应用价值。 With the continuous evolution of traffic inspection technology,traditional encryption communication techniques have exposed inherent deficiencies in hiding data features.In order to counteract censorship,various technological means have emerged,among which anonymous communication technology has shown significant potential for development due to its unique design concepts.To further explore the future development direction of anonymous communication technology,this study adopted literature research,experimental research,and qualitative analysis methods to analyze and summarize the existing implementation methods of anonymous communication technology,and identified the risk of being recognized by censors.Based on these findings,the future development direction and application value of anonymous communication technology are proposed.
作者 王鹰 高海昌 WANG Ying;GAO Haichang(Department of Network Management,Xi'an National Administration of State Secrets Protection,Xi'an Shaanxi 710008,China;School of Computer Science and Technology,Xidian University,Xi'an Shaanxi 710071,China)
出处 《信息安全与通信保密》 2023年第1期60-70,共11页 Information Security and Communications Privacy
关键词 匿名通信 匿名代理 流量混淆 加密通信 anonymous communication anonymous proxy traffic obfuscation encrypted communication
  • 相关文献

参考文献2

二级参考文献14

  • 1陆天波,方滨兴,孙毓忠,程学旗.点对点匿名通信协议WonGoo的性能分析[J].计算机工程,2006,32(2):26-28. 被引量:5
  • 2CHAUM D. Untraceable electronic ,nail, return addresses, and digital pseudonyms [ J]. Communications of the ACM, 1981, 24(2), 84 - 88.
  • 3REITER M K, RUBIN A D. Crowds: Anonymity for web transactions[ J]. ACM Transactions on Information and System Security, 1998, 1(1):62-92.
  • 4FREEDMAN M J, MORRIS R. Tarzan: A Peer-to-Peer anonymizing network layer[ C]//CCS2002: Proceedings of 9th ACM Conference on Computer and Communication Security. Washington: IEEE, 2002:453-465.
  • 5RENNHARD M, PLATTNER B. Introducing morphMix: Peer-to- Peer based anonymous intemet usage with collusion detection [ C]// Proceedings of the workshop on Privacy in the Electronic Society. New York: ACM, 2002: 91- 102.
  • 6LU TIAN-BO, FANG BIN-XING, SUN YU-ZHONG, et al. Won- Goo: A Peer-to-Peer Protocol for anonymous communication [ C]// PDPTA'04 : Proceedings of the 2004 International Conference on Parallel and Distributed Processing Techniques and Applications. [S. l.]: DBLP, 2004: 1102-1106.
  • 7DIAZ C, SEYS S, CLAESSENS J, et al. Towards measuring anonymity [ C]//PET2002: Proceedings of Privacy Enhancing Technologies, LNCS 2482. Berlin: Springer-Verlag, 2003: 184-188.
  • 8DIAZ C. Anonymity and privacy in electronic services[ D]. [ S. l] : Katholieke Universiteit Leuven, 2005.
  • 9SERJANTOV A, DANEZIS G. Towards an information theoretic metric for anonymity [ C]// PET '02: Proceedings of Privacy Enhancing Technologies workshop, LNCS 2482. Berlin: Springer-Verlag, 2003: 259 - 263.
  • 10SHANNON C E. The mathematical theory of communication[ J]. Bell System Technical Journal, 1948, 27:379 -423.

共引文献1

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部