Design and Analysis of an IPLayer Anonymizing Infrastructure
暂无分享,去创建一个
H. T. Kung | Chen-Mou Cheng | Koan-Sin Tan | Scott Bradner | S. Bradner | Chen-Mou Cheng | Koan-Sin Tan
[1] Deborah Estrin,et al. Advances in network simulation , 2000, Computer.
[2] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[3] H. T. Kung,et al. An IP-layer anonymizing infrastructure , 2002, MILCOM 2002. Proceedings.
[4] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[5] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[6] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[7] Robert Tappan Morris,et al. Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer , 2002, IPTPS.
[8] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[9] Craig Partridge,et al. Host Anycasting Service , 1993, RFC.
[10] Douglas S. Reeves,et al. Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones , 2002, ESORICS.
[11] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[12] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.