[1] Shields C,Levine B N.A protocol for anonymous communication over the internet[A].Proceedings of the ACM Conference on Computer and Communications Security[C].New York:ACM,2010.33-42.
[2] Goldschlag D.Onion routing for anonymous and private internet connections[J].Communications of the ACM,1999,42(2):39-41.
[3] Dingledine R,Mathewson N,Syverson P.Tor:the second-generation onion router[J].Journal of the Franklin Institute,2004,239(2):135-139.
[4] Chaum D.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88.
[5] Reiter M K,Rubin A D.Crowds:anonymity for Web transactions[J].ACM Transactions on Information & System Security,1997,1(1):66-92.
[6] 周彦伟,杨波,吴振强,等.基于网络编码的匿名通信模型[J].中国科学信息科学,2014,44(12):1560-1579. ZHOU YanWei,YANG Bo,WU ZhenQiang,et al.Anonymous communication model based on network coding[J].China Science,Information Science,2014,44(12):1560-1579.(in Chinese)
[7] 段桂华,王伟平,王建新,等.一种基于多路径网络编码的匿名通信机制[J].软件学报,2010,21(9):2338-2351. DUAN GuiHu,WANG WeiPing,WANG JianXin,et al.Anonymous communication mechanism with multi-paths network coding[J].Journal of Software,2010,21(9):2338-2351.(in Chinese)
[8] Chaum D.The dining cryptographers' problem:Unconditional sender and recipient untraceability[J].Journal of Cryptology,1988,1(1):65-75.
[9] Sherwood B R,Bhattacharjee B,Srinivasan A.P5:A protocol for anonymous communications[A].Proceedings of the IEEE Symposium on Security & Privacy[C].Berkeley:IEEE,2002.58-70.
[10] Freedman MJ,Morris R.Tarzan:A peer-to-peer anonymizing network layer[A].Proceedings of the ACM Conference on Computer and Communications Security[C].Washington:ACM,2002.193-206.
[11] Yu M,Sadeghi P,Aboutorab N.Performance characterization and transmission schemes for instantly decodable network coding in wireless broadcast[J].Journal on Advances in Signal Processing,2015,2015(1):1987-1996.
[12] Koetter R,Médard M.An algebraic approach to network coding[J].IEEE/ACM Transactions on Networking,2003,11(5):782-795.
[13] 吴振强,马亚蕾.编码混淆:一种新型匿名通信模型[J].武汉大学学报(理学版).2011,57(5):401-407. Wu ZhenQiang,Ma YaLei.A novel anonymous communication model:coding mix[J].Journal of Wuhan University:Natural Science Edition,2011,57(5):401-407.(in Chinese)
[14] 冯登国,秦宇,汪丹,等.可信计算技术研究[J].计算机研究与发展,2011,48(8):1332-1349. Feng Dengguo,Qin Yu,Wang Dan,et al.Research on trusted computing technology[J].Journal of Computer Research and Development,2011,48(8):1332-1349.(in Chinese) |