Measuring and analyzing node families in the Tor anonymous communication network

被引:0
|
作者
Wang, Xiao [1 ,2 ,3 ,4 ,5 ]
Fang, Bin-Xing [1 ,2 ,4 ]
Liu, Pei-Peng [1 ,2 ,3 ,4 ]
Guo, Li [2 ,4 ]
Shi, Jin-Qiao [2 ,4 ]
机构
[1] Institute of Computing Technology, Chinese Academy of Sciences, Beijing,100190, China
[2] Institute of Information Engineering, Chinese Academy of Sciences, Beijing,100093, China
[3] Graduated University of Chinese Academy of Sciences, Beijing,100190, China
[4] Chinese National Engineering Laboratory for Information Security Technologies, Beijing,100093, China
[5] National Computer Network Emergency Response Technical Team/Coordination Center, Beijing,100029, China
来源
关键词
D O I
10.11959/j.issn.1000-436x.2015036
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Anonymous Communication with Network Coding against Traffic Analysis Attack
    Wang, Jin
    Wang, Jianping
    Wu, Chuan
    Lu, Kejie
    Gu, Naijie
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 1008 - 1016
  • [32] Effectiveness Analysis of ALNCode Scheme for Anonymous Communication with Network Coding
    Zhou, Yihui
    Liao, Xuening
    Wu, Zhenqiang
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (06) : 1961 - 1974
  • [33] Anonymous communication mechanism with multi-paths network coding
    Duan G.-H.
    Wang W.-P.
    Wang J.-X.
    Yang L.-M.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (09): : 2338 - 2351
  • [34] A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network
    Wang, Yulong
    Yi, Junjie
    Guo, Jun
    Qiao, Yanbo
    Qi, Mingyue
    Chen, Qingyu
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [35] ANOA: A Framework For Analyzing Anonymous Communication Protocols Unified Definitions and Analyses of Anonymity Properties
    Backes, Michael
    Kate, Aniket
    Manoharan, Praveen
    Meiser, Sebastian
    Mohammadi, Esfandiar
    2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 163 - 178
  • [36] Modelling communication capability and node reorientation in offshore communication network
    Surendran, Simi
    Ramesh, Maneesha Vinodini
    Montag, Martin J.
    Montresor, Alberto
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87
  • [37] AdaWFPA: Adaptive Online Website Fingerprinting Attack for Tor Anonymous Network: A Stream-wise Paradigm
    Attarian, Reyhane
    Abdi, Lida
    Hashemi, Sattar
    COMPUTER COMMUNICATIONS, 2019, 148 : 74 - 85
  • [38] Design of Communication Node in Underwater Acoustic Network
    Li, Li
    Qiao, Guangxin
    Zhao, Jing
    Yang, Lijuan
    Imtiaz, Md Nasir
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 591 - 594
  • [39] On the Assignment of Node Number in a Computer Communication Network
    Kamalesh, V. N.
    Srivatsa, S. K.
    WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 375 - 378
  • [40] An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things
    Li, Fengyin
    Ren, Pei
    Yang, Guoyu
    Sun, Yuhong
    Wang, Yilei
    Wang, Yanli
    Li, Siyuan
    Zhou, Huiyu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021