[1] ZONOOZI M M, DASSANAYAKE P. User mobility modeling and characterization of mobility patterns[J]. IEEE Journal on Selected Areas in Communications.1997, 15(7): 1239-1252.[2] WANG K H, BAOCHUN L. Efficient and guaranteed service coverage in partitionable mobile Ad Hoc networks[C]// Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE,2002:1089-1098.[3] GOLDSCHLAG D, REED M, SYVERSON P. Onion routing[J].Communications of the ACM,1999, 42(2):39-41.[4] 杨伟伟,刘胜利,蔡瑞杰,等.一种Tor匿名通信系统的改进方案[J].信息工程大学学报,2012,13(4):503-507.[5] CHAUM D. Untraceable electronic mail return addresses, and digital pseudonyms[J]. Communications of the ACM,1981,24(2):84-90.[6] HAN J S, ZHU Y M, LIU Y H, et al. Provide privacy for mobile P2P systems[C]// Proceedings of the 25th IEEE International Workshops on Distributed Computing Systems. Piscataway: IEEE,2005: 829-834.[7] 杨志兴,汤红波,王晓雷,等. 移动P2P网络双向匿名通信机制设计[J]. 计算机工程,2012,38(11):120-123.[8] SHERWOOD R, BHATTACHARJEE B, SRINIVASAN A. P5:A protocol for scalable anonymous communication[C]// Proceedings of the 2002 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society,2002:58.[9] HAN J, LIU Y. Mutual anonymity for mobile P2P systems[J].IEEE Transactions on Parallel and Distributed Systems,2008,19(8):1009-1019.[10] 李致远,王汝传. 移动对等网络安全若干关键技术研究[D]. 南京:南京邮电大学,2011.[11] 王伟平,罗熹,王建新. SACS:一种可扩展的匿名通信系统[J]. 小型微型计算机系统,2007,28(2):237-242.[12] 杨逸. P2P匿名通信网络的安全分析与性能优化[D]. 上海:上海交通大学,2012. |