|
[1]
|
周彦伟, 杨启良, 杨波, 吴振强. 一种安全性增强的Tor匿名通信系统[J]. 计算机研究与发展, 2014, 51(7): 1538-1546.
|
|
[2]
|
高俊杰. I2P匿名通信系统优化与实现[D]: [硕士学位论文]. 北京: 北京大学, 2014.
|
|
[3]
|
Montieri, A., Ciuonzo, D., Aceto, G. and Pescapé, A. (2017) Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark. 2017 29th International Teletraffic Congress (ITC 29), Genoa, 81-89.
|
|
[4]
|
周勇. 基于Tor的匿名通信研究[D]: [硕士学位论文]. 西安: 西安电子科技大学, 2013.
|
|
[5]
|
罗军舟, 杨明, 凌振, 吴文甲, 顾晓丹. 匿名通信与暗网研究综述[J]. 计算机研究与发展, 2019, 56(1): 103-130.
|
|
[6]
|
Ali, A., Khan, M., Saddique, M., Pirzada, U., Zohaib, M., Ahmad, I. and Debnath, N. (2016) TORvs I2P: A Comparative Study. Proceedings of the 2016 IEEE International Conference on Industrial Technology, Taipei, 14-17 March 2016, 3.
|
|
[7]
|
王有文. 第二代洋葱路由匿名系统Tor的性能改进研究[D]: [硕士学位论文]. 北京: 北京邮电大学, 2017.
|
|
[8]
|
Conrad, B. and Shirazi, F. (2014) A Survey on Tor and I2P. ICIMP 2014: The Ninth International Conference on Internet Monitoring and Protection, Paris, 20-24 July 2014, 20.
|
|
[9]
|
Timpanaro, J.P., Cholez, T., Chrisment, I. and Festor, O. (2015) Evaluation of the Anonymous I2P Network’s Design Choices against Performance and Security. ICISSP 2015-Proceedings of the 1st International Conference on Information Systems Se-curity and Privacy, Angers, France, 9-11 February 2015, 46-55.
|
|
[10]
|
Müller, J. (2016) Analysis of the I2P Network-Information Gathering and Attack Evaluations. Bachelors Thesis, Bern University of Applied Sciences, Bern, Biel, Burgdorf.
|
|
[11]
|
Vashi, D. and Khilari, G. (2015) Performance Improvement in I2P Using SSL. International Journal of Science, Engineering and Technology Re-search, 4, 1454-1456.
|
|
[12]
|
Shahbar, K. (2017) Analysis of Multilayer-Encryption Anonymity Networks. Ph.D. Thesis, Dalhousie University Halifax, Nova Scotia.
|
|
[13]
|
Biryukov, A., Pustogarov, I. and Weinmann, R.-P. (2013) Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, 19-22 May 2013, 80-94. [Google Scholar] [CrossRef]
|
|
[14]
|
Biryukov, A., Thill, F., Pustogarov, I. and Weinmann, R.-P. (2014) Content and Popu-larity Analysis of Tor Hidden Services. 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops, Ma-drid, Spain, 30 June-3 July 2014, 188-193. [Google Scholar] [CrossRef]
|
|
[15]
|
Casenove, M. and Miraglia, A. (2014) Botnet over Tor: The Illusion of Hiding. 2014 6th International Conference on Cyber Conflict, Tallinn, Estonia, 3-6 June 2014, 273-282. [Google Scholar] [CrossRef]
|
|
[16]
|
Astolfi, F., Kroese, J. and Van Oorschot, J. (2015) I2P-The In-visible Internet Project. Media Technology, Leiden University Web Technology Report.
|
|
[17]
|
Timpanaro, J.P., Cholez, T., Chrisment, I. and Festor, O. (2015) Evaluation of the Anonymous I2P Network’s Design Choices against Performance and Security. 2015 Interna-tional Conference on Information Systems Security and Privacy, Angers, France, 9-11 February 2015, 9.
|
|
[18]
|
Karthigeyan, A., Rob-inson Joel, M., Manikandan, S.P., Raja Guru, P. and Raman, S. (2014) A Comprehensive Behavior Analysis of TOR versus I2P. In-ternational Journal of Applied Engineering Research, 9, 73337345.
|
|
[19]
|
Lin, Y., Yu, X.Z., Zhao, J., Zhan, D.Y., Du, X.J. and Guiz-Ani, M. (2018) Deciding Your Own Anonymity: User-Oriented Node Selection in I2P. IEEE Access, 6, 71350-71359. [Google Scholar] [CrossRef]
|
|
[20]
|
Egger, C., Schlumberger, J., Kruegel, C. and Vigna, G. (2013) Practical Attacks against the I2P Network. In: Stolfo, S.J., Stavrou, A. and Wright, C.V., Eds., Research in Attacks, Intrusions, and Defenses. RAID 2013. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 432-451. [Google Scholar] [CrossRef]
|
|
[21]
|
Timpanaro, J.P., Cholez, T., Chrisment, I. and Festor, O. (2015) Evaluation of the Anonymous I2PNetwork’s Design Choices against Performance and Security. TELECOM Nancy Universite’ de Lorraine INRIA/LORIA, France.
|
|
[22]
|
Timpanaro, J.P., Chrisment, I. and Festor, O. (2011) Monitoring the I2P Network. https://hal.inria.fr/hal-00653136
|