计算机网络匿名的危害,基于网络行为匿名特征的Tor网络匿名度分析

[1] Dingledine R, Mathewson N, Syverson P. Tor:the second-generation onion router[C] //Proc of the 13th Conference on USENIX Security Symposium. 2004:135-139.

[2] Pfitzmann A, Tu D, Hansen M. A terminology for talking about privacy by data minimization:anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management :a consolidated proposal for terminology[EB/OL] . (2010-08-10)[2016-03-22] .

[3] Reiter M K, Rubin A D. Crowds:anonymity for Web transactions[J] . ACM Trans on Information & System Security, 1998, 1(1):66-92.

[4] Berthold O, Federrath H, Kpsell S. Web MIXes:a system for ano-nymous and unobserable Internet access[C] //Proc of International Workshop on Dessign Issues in Anonymity and Unobservability. 2001:115-129.

[5] Serjantov A, Danezis G. Towards an information theoretic metric for anonymity[C] //Proc of the 2nd International Conference on Privacy Enhancing Technologies. 2002:41-53.

[6] Díaz C, Seys S, Claessens J, et al. Towards measuring anonymity[C] //Proc of the 2nd Privacy Enhancing Technologies Workshop. Berlin:Springer, 2002:54-68.

[7] Hughes D, Shmatikov V. Information hiding, anonymity and privacy:a modular approach[J] . Journal of Computer Security:Special Issue on WITS’02, 2004, 12(1):3-36.

[8] Clauβ S, Schiffner S. Structuring anonymity metrics[C] //Proc of the 2nd ACM Workshop on Digital Identity Management. New York:ACM Press, 2006:55-62.

[9] Andersson C, Lundin R. On the fundamentals of anonymity metrics[M] . New York:Springer, 2008:325-341.

[10] Chaum D. The dining cryptographers problem:unconditional sender and recipient untraceability[J] . Journal of Cryptology, 1988, 1(1):65-75.

[11] Chantin E, Shin J, Yu Jiangmin. Revisiting circuit clogging attacks on Tor[C] //Proc of the 8th International Conference on Availability, Reliability and Security. 2013:131-140.

[12] Liu Xin, Wang Neng. Design improvement for Tor against low-cost traffic attack and low-resource routing attack[C] //Proc of WRI International Conference on Communications and Mobile Computing. Washington DC:IEEE Computer Society, 2009:549-554.

  • 0
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值