参考文献/References:
[1] 高俊杰. I2P匿名通信系统优化与实现[D]. 北京:北京大学,2014.
GAO J J. The optimization and implementation of I2P anonymous communication system [D]. Beijing:Peking University,2014.(in Chinese)
[2]ANON. I2P[EB/OL].(2018-07-02). https://zh.wikipedia.org/zh-hans/I2P.
[3]周勇. 基于Tor的匿名通信研究[D]. 西安:西安电子科技大学,2013.
ZHOU Y. Research on anonymous communication based on TOR[D]. Xi’an: Xidian University,2013.(in Chinese)
[4]DAVID C. Mix-Net[EB/OL].(2018-07-03). https://en.wikipedia.org/wiki/Mix_network.
[5]黄文杰. 基于Tor网络的随机均匀分布路由算法[D]. 上海:上海交通大学,2012.
HUANG W J. Uniform distribution routing algorithm based on Tor network[D]. Shanghai:Shanghai Jiao Tong University,2012.(in Chinese)
[6]ANON. Tor[EB/OL].(2018-06-28)https://zh.wikipedia.org/zh-hans/Tor.
[7]周彦伟,杨启良,杨波,等. 一种安全性增强的Tor匿名通信系统[J]. 计算机研究与发展,2014,51(7):1538-1546.
ZHOU Y W,YANG Q L,YANG B,et al. A Tor anonymous communication system with security enhancements [J]. Journal of computer research and development,2014,51(7):1538-1546.(in Chinese)
[8]刘鑫. 基于Tor网络的匿名通信研究[D]. 上海:华东师范大学,2011.
LIU X. Research on anonymous communication based on Tor network[D]. Shanghai: East China Normal University,2011.(in Chinese)
[9]赵福祥,王育民,王常杰. 可靠洋葱路由的设计与实现[J]. 计算机学报,2001,24(5):463-467.
ZHAO F X,WANG Y M,WANG C J. An authenticated scheme of onion routing[J]. Chinese journal of computer,2001,24(5):463-467.(in Chinese)
[10]王伟平,陈建二,王建新,等. 基于组群的有限路长匿名通信协议[J]. 计算机研究与发展,2003,40(4):609-614.
WANG W P,CHEN J E,WANG J X,et al. An anonymous communication protocol based on groups with definite route length[J]. Journal of computer research and development,2003,40(4): 609-614.(in Chinese)
[11]王伟平,陈建二,陈松乔,等.匿名通信中短距离优先分组重路由方法的研究[J]. 软件学报,2004,15(4):561-570.
WANG W P,CHEN J E,CHEN S Q,et al. Research on a short distance-prior rerouting scheme in anonymous communication[J]. Journal of software,2004,15(4):561-570.(in Chinese)
[12]李金栓. 基于I2P的匿名通信协议分析与流量检测的研究[D]. 成都:电子科技大学,2015.
LI J S. Research on the analysis of I2P anonymous communication protocol and flow identification[J]. Chengdu: University of Electronic Science and Technology of China,2015.(in Chinese)
[13]CONTI M,CRANE S,FRASSETTO T,et al. Selfrando:securing the Tor browser against de-anonymization exploits[J]. Proceedings on privacy enhancing technologies,2016(4):454-459.
[14]廖小平. 对前向安全代理盲签名方案的分析与改进[J]. 计算机系统应用,2018,27(3):217-220.
LIAO X P. Analysis and improvement of forward secure proxy blind signature scheme[J]. Computer systems and applications,2018,27(3):217-220.(in Chinese)
[15]ANON. Forward security[EB/OL].(2018-05-25). https://zh.wikipedia.org/wiki/Forward security.
[16]JUAN P T,THIBAULT C,ISABELLE C,et al. Evaluation of the anonymous I2P network’s design choices against performance and security[C]//ICISSP 2015—Proceedings of the 1st International Conference on Information Systems Security and Privacy. Angers,France,2015.