СРАВНИТЕЛЬНЫЙ АНАЛИЗ АНОНИМНЫХ КОММУНИКАЦИОННЫХ СИСТЕМ С НИЗКОЙ ЛАТЕНТНОСТЬЮ
https://doi.org/10.31854/1813-324Х-2018-4-3-85-97
Аннотация
Ключевые слова
Об авторах
И. .. МурталаРоссия
О. А. Тиамийу
Россия
Список литературы
1. Ling Z., Luo J., Yu W., Fu X. Equal-Sized Cells Mean Equal-Sized Packets in Tor? // IEEE International Conference on Communications (ICC). 2011. DOI:10.1109/icc.2011.5962653.
2. Sun Q., Simon D.R., Wang Y.M., Russell W., Padmanabhan V.N., Qiu L. Statistical Identification of Encrypted Web Browsing Traffic // IEEE Symposium on Security and Privacy (SP). 2002. DOI:10.1109/SECPRI.2002.1004359.
3. Overlier L., Syverson P. Locating hidden servers // IEEE Symposium on Security and Privacy (S&P'06). 2006. DOI:10.1109/SP.2006.24.
4. Wang X., Chen S., Jajodia S. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems // IEEE Symposium on Security and Privacy (SP '07). 2007. PP. 116-130. DOI:10.1109/SP.2007.30.
5. Snader R., Borisov N.A Tune-up for Tor: Improving Security and Performance in the Tor Network // 15th Annual Network and Distributed System Security Conference (NDSS'08). 2008.
6. Beach A., Gartrell M., Han R. Solutions to Security and Privacy Issues in Mobile Social Networking // International Conference on Computational Science and Engineering. 2009. Vol. 4. PP. 1036-1042. DOI:10.1109/CSE.2009.243.
7. Chen J., Du X., Fang B. An efficient anonymous communication protocol for wireless sensor networks // Wireless Communications and Mobile Computing. 2012. Vol. 12. Iss. 14. PP. 1302-1312. DOI:10.1002/wcm.1205.
8. Jansen R., Syverson P., Hopper N. Throttling Tor Bandwidth Parasites. University of Minnesota TR 11-019, 2011. DOI:10.21236/ada559183.
9. Yu S., Zhou W., Jia W., Hu J. Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics // The Computer Journal. 2012. Vol. 55. Iss. 4. PP. 410-421. DOI:10.1093/comjnl/bxr065.
10. Wilson M., Bazli B. Forensic analysis of I2P activities // 22nd International Conference on Automation and Computing (ICAC). 2016. PP. 529-534. DOI:10.1109/IConAC.2016.7604974.
11. Dingledine R., Mathewson N., Syverson P. Tor: The Second-Generation Onion Router // 13th USENIX Security Symposium. 2004. Vol. 14. DOI:10.21236/ada465464.
12. Wendolsky R., Herrmann D., Federrath H. Performance Comparison of Low-Latency Anonymisation Services from a User Perspective. Privacy Enhancing Technologies // Lecture Notes in Computer Science. 2007. Vol. 4776. PP. 233-253. DOI:10.1007/978-3-540-75551-7_15.
13. Winkler S., Zeadally S. An analysis of tools for online anonymity // International Journal of Pervasive Computing and Communications. 2015. Vol. 11. Iss. 4. PP. 436-453. DOI:10.1108/IJPCC-08-2015-0030.
14. Kong J., Hong X. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. // 4th ACM international symposium on Mobile ad hoc networking & computing (MobiHoc '03). 2003. PP. 291-302. DOI:10.1145/ 778445.778449.
15. Fang Q., Li S., Zhou R. The Application of Onion Routing in Anonymous Communication // 2nd International Conference on MultiMedia and Information Technology (MMIT). 2010. PP. 244-246. DOI:10.1109/MMIT.2010.13.
16. Sitthiworachart J., Joy M. Web-based peer assessment system with an anonymous communication tool // IEEE International Conference on Advanced Learning Technologies. 2004. PP. 918-919. DOI:10.1109/ICALT.2004.1357720.
17. Prakash A., Agrawa D.P., Chen Y. Network Coding Combined with Onion Routing for Anonymous and Secure Communication in a Wireless Mesh Network // International journal of Computer Networks & Communications (IJCNC). 2014. Vol. 6. Iss. 6. PP. 1-14. DOI:10.5121/ijcnc.2014.6601.
Рецензия
Для цитирования:
Муртала И..., Тиамийу О.А. СРАВНИТЕЛЬНЫЙ АНАЛИЗ АНОНИМНЫХ КОММУНИКАЦИОННЫХ СИСТЕМ С НИЗКОЙ ЛАТЕНТНОСТЬЮ. Труды учебных заведений связи. 2018;4(3):85-97. https://doi.org/10.31854/1813-324Х-2018-4-3-85-97
For citation:
Murtala I..., Tiamiyu O.A. COMPARATIVE ANALYSIS OF LOW LATENCY ANONYMOUS COMMUNICATION SYSTEMS. Proceedings of Telecommunication Universities. 2018;4(3):85-97. (In Russ.) https://doi.org/10.31854/1813-324Х-2018-4-3-85-97