欢迎来到天天文库
浏览记录
ID:33323274
大小:554.24 KB
页数:56页
时间:2019-02-24
《tor匿名通信技术的研究》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、哈尔滨工业大学工学硕士学位论文Moreover,italsoanalyzedthatthereleasedmechanismofanonymousresourcesmakeinfluenceontheanonymityofanonymoussystem.Meanwhile,itputforwardtheexpansionproposalsonenumerateddiscoverymechanismofanonymouscommunicationresources,improvedtheabilitythatthehostilenodesmaliciouslycol
2、lectedsystemresourcessoastoprotecttheanonymityofanonymoussystemfromdamage.Inordertograspthedistributionandexistenceconditionofanonymoussystemresources,thepaperdesignedanactivedetectingstrategyofanonymouscommunicationresources,achievedthesimulateddetectionsystemofanonymousresourcesandm
3、adefunctionalverificationonresourcedetectionandroutenodesofTornetwork.Meanwhile,accordingtotheexperimentaldata,itanalyzedtheresourcesdistributionofTornetwork.Andmadeanevaluationaccordingly,suchasontheaspectsoftheoperatingperformanceandsecurityofTornetwork,etc.Keywords:Anonymouscommuni
4、cation;TOR;Resourcepublic-III-哈尔滨工业大学工学硕士学位论文目录摘要......................................................................................................................IAbstract.............................................................................................................
5、...II第1章绪论.........................................................................................................11.1课题研究的背景和意义............................................................................11.2匿名通信系统研究现状..................................................................
6、..........21.2.1匿名通信介绍.....................................................................................21.2.2匿名技术的发展.................................................................................21.2.3匿名通信系统分类......................................................................
7、.......41.3课题主要研究内容....................................................................................51.4论文组织....................................................................................................6第2章Tor匿名通信技术.............................................................
8、.....
此文档下载收益归作者所有