Tianbo Lu, Shixian Du, Yang Li, Peiyuan Dong, Xiaoyan Zhang
{"title":"对匿名网络拓扑的分析","authors":"Tianbo Lu, Shixian Du, Yang Li, Peiyuan Dong, Xiaoyan Zhang","doi":"10.1109/SECTECH.2014.16","DOIUrl":null,"url":null,"abstract":"Nowadays, Internet privacy becomes more and more important and sensitive, and has been one of the latest buzz words to hit the Internet world. As one of privacy enhancing technologies, anonymous communication has been extensively studied from various aspects by researchers. In this work, in order to better grasp the present situation of research, we investigate existing organizations and universities which study anonymous communication from the perspective of network topology, and related projects.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards an Analysis of Anonymous Network Topology\",\"authors\":\"Tianbo Lu, Shixian Du, Yang Li, Peiyuan Dong, Xiaoyan Zhang\",\"doi\":\"10.1109/SECTECH.2014.16\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, Internet privacy becomes more and more important and sensitive, and has been one of the latest buzz words to hit the Internet world. As one of privacy enhancing technologies, anonymous communication has been extensively studied from various aspects by researchers. In this work, in order to better grasp the present situation of research, we investigate existing organizations and universities which study anonymous communication from the perspective of network topology, and related projects.\",\"PeriodicalId\":159028,\"journal\":{\"name\":\"2014 7th International Conference on Security Technology\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 7th International Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECTECH.2014.16\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 7th International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2014.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Nowadays, Internet privacy becomes more and more important and sensitive, and has been one of the latest buzz words to hit the Internet world. As one of privacy enhancing technologies, anonymous communication has been extensively studied from various aspects by researchers. In this work, in order to better grasp the present situation of research, we investigate existing organizations and universities which study anonymous communication from the perspective of network topology, and related projects.