Проблемы сокрытия трафика в анонимной сети и факторы, влияющие на анонимность - page 9

Проблема сокрытия трафика в анонимной сети…
9
[11]
Chaum D. L. The Dining Cryptographers Problem: Unconditional Sender and
Receiver Untraceability.
Journal of Cryptology
, 1988, no. 1 (1), рр. 66–75.
[12]
Berthold O., Federrath H., Kopsell S. WebMIXes: A System for Anonymous
and Unobservable Internet Access.
Designing Privacy Enhancing Technologies.
Lecture Notes in Computer Science
, 2009, pp. 115–129.
[13]
Syverson P., Tsudik G., Reed M., Landwehr C. Towards an Analysis of On-
ion Routing Security.
Designing Privacy Enhancing Technologies. Lecture
Notes in Computer Science,
2009, pp. 96–114.
[14]
Wiangsripanawan R., Susilo W., Safavi-Naini R. Design Principles for Low
Latency Anonymous Network Systems Secure Against Timing Attacks.
Pro-
ceedings of the Fifth Australasian Symposium on ACSW Frontiers
, 2007, no. 68,
pp. 183–191.
[15]
Tor.
Anonymity
Online
.
Available
at:
(accessed on 22.06.2014).
Yershov N.G.,
(b. 1991)
a student of the Software and Information Technologies De-
partment at Bauman Moscow State Technical University. The fields of research are in-
formation security, processing network information, drivers development. e-mail: yer-
Ryazanova N.Yu.
(b. 1951) graduated from the Moscow Institute of Electronics and
Mathematics in 1973. Ph.D., assoc. professor of the Software and Information Technolo-
gies Department at Bauman Moscow State Technical University. Author of over 38 sci-
entific and educational works in the field of the system programming and computer
graphics. e-mail:
1,2,3,4,5,6,7,8 9
Powered by FlippingBook