IPsec-Based Anonymous Networking: A Working Implementation
暂无分享,去创建一个
[1] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[2] Craig Metz,et al. PF_KEY Key Management API, Version 2 , 1998, RFC.
[3] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[4] Michael J. Freedman,et al. A peer-to-peer anonymizing network layer , 2002 .
[5] Renato Lo Cigno,et al. Solving Performance Issues in Anonymization Overlays with a L3 approach , 2008 .
[6] Wes Hardaker,et al. IPsec Security Policy Database Configuration MIB , 2007, RFC.
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Paul F. Syverson,et al. Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services , 2007, Privacy Enhancing Technologies.
[9] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[10] Nikita Borisov,et al. A Tune-up for Tor: Improving Security and Performance in the Tor Network , 2008, NDSS.
[11] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[12] Renato Lo Cigno,et al. Traffic Flow Confidentiality in IPsec: Protocol and Implementation , 2007, FIDIS.