Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (4): 100-110.doi: 10.19665/j.issn1001-2400.2023.04.010
• Special Issue on Cyberspace Security • Previous Articles Next Articles
YANG Xiaohui(),ZHUANG Haijing()
Received:
2022-12-31
Online:
2023-08-20
Published:
2023-10-17
Contact:
Haijing ZHUANG
E-mail:yxh@hbu.edu.cn;haijing945@foxmail.com
CLC Number:
YANG Xiaohui,ZHUANG Haijing. Anonymous communication model with dynamic negotiation of identifiers[J].Journal of Xidian University, 2023, 50(4): 100-110.
[1] |
MAYER J, MUTCHLER P, MITCHELL J C. Evaluating the Privacy Properties of Telephone Metadata[J]. Proceedings of the National Academy of Sciences, 2016, 113(20):5536-5541.
doi: 10.1073/pnas.1508081113 |
[2] | DE MONTJOYE Y A. Computational Privacy:Towards Privacy-Conscientious Uses of Metadata[D]. Cambridge City: Massachusetts Institute of Technology, 2015. |
[3] | JIANG L, LI T, LI X, et al. Anonymous Communication via Anonymous Identity-Based Encryption and its Application in IoT[J]. Wireless Communications and Mobile Computing, 2018, 2018:1-8. |
[4] | CHAUM D, DAS D, JAVANI F, et al. cMix:Mixing with Minimal Real-Time Asymmetric Cryptographic Operations[C]// International Conference on Applied Cryptography and Network Security.Heidelberg:Springer, 2017:557-578. |
[5] | 徐花, 田有亮. 差分隐私下的权重社交网络隐私保护[J]. 西安电子科技大学学报, 2022, 49(1):17-25. |
XU Hua, TIAN Youliang. Protection of Privacy of the Weighted Social Network under Differential Privacy[J]. Journal of Xidian University, 2022, 49(1):17-25. | |
[6] |
JAYARAMAN I, STANISLAUS PANNEERSELVAM A. A Novel Privacy Preserving Digital Forensic Readiness Provable Data Possession Technique for Health Care Data in Cloud[J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12(5):4911-4924.
doi: 10.1007/s12652-020-01931-1 |
[7] |
SILVA P, CASALEIRO R, SIMÖES P, et al. Risk Management and Privacy Violation Detection in the PoSeID-on Data Privacy Platform[J]. SN Computer Science, 2020, 1(4):1-10.
doi: 10.1007/s42979-019-0007-y |
[8] |
WANG X, XU Z, CAI Z, et al. Novel Temporal Perturbation-Based Privacy-Preserving Mechanism for Smart Meters[J]. Mobile Networks and Applications, 2020, 25(4):1548-1562.
doi: 10.1007/s11036-019-01359-8 |
[9] | 左开中, 刘蕊, 赵俊, 等. 融合语义信息的时空关联位置隐私保护方法[J]. 西安电子科技大学学报, 2022, 49(1):67-77. |
ZUO Kaizhong, LIU Rui, ZHAO Jun, et al. Method for the Protection of Spatiotemporal Correlation Location Privacy with Semantic Information[J]. Journal of Xidian University, 2022, 49(1):67-77. | |
[10] |
LI F, LIU Z, WANG Y, et al. Aitac:An Identity-Based Traceable Anonymous Communication Model[J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13:1353-1362.
doi: 10.1007/s12652-020-02604-9 |
[11] |
LI Y, WANG G, NIE L, et al. Distance Metric Optimization Driven Convolutional Neural Network for Age Invariant Face Recognition[J]. Pattern Recognition, 2018, 75:51-62.
doi: 10.1016/j.patcog.2017.10.015 |
[12] |
LI J, ZHANG Y, CHEN X, et al. Secure Attribute-Based Data Sharing for Resource-Limited Users in Cloud Computing[J]. Computers & Security, 2018, 72:1-12.
doi: 10.1016/j.cose.2017.08.007 |
[13] | CORRIGAN-GIBBS H, WOLINSKY D I, FORD B. Proactively Accountable Anonymous Messaging in Verdict[C]// 22nd USENIX Security Symposium (USENIX Security 13). New York: ACM, 2013:147-162. |
[14] | SUN Q, LIN K, SI C, et al. A Secure and Anonymous Communicate Scheme over the Internet of Things[J]. ACM Transactions on Sensor Networks (TOSN), 2022, 18(3):1-21. |
[15] |
DIAB T, GILG M, LORENZ P, et al. Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets:I2P Vehicular Protocol(IVP)[J]. Wireless Personal Communications, 2022, 127:2625-2644.
doi: 10.1007/s11277-022-09888-4 |
[16] |
MARIA A, RAJASEKARAN A S, AL-TURJMAN F, et al. Baiv:An Efficient Blockchain-Based Anonymous Authentication and Integrity Preservation Scheme for Secure Communication in VANETs[J]. Electronics, 2022, 11(3):488.
doi: 10.3390/electronics11030488 |
[17] |
BUCCAFURRI F, DE ANGELIS V, IDONE M F, et al. A Protocol for Anonymous Short Communications in Social Networks and its Application to Proximity-Based Services[J]. Online Social Networks and Media, 2022, 31:100221.
doi: 10.1016/j.osnem.2022.100221 |
[18] |
CHAUM D L. Untraceable Electronic Mail,Return Addresses,and Digital Pseudonyms[J]. Communications of the ACM, 1981, 24(2):84-90.
doi: 10.1145/358549.358563 |
[19] |
CHAUM D. The Dining Cryptographers Problem:Unconditional Sender and Recipient Untraceability[J]. Journal of Cryptology, 1988, 1(1):65-75.
doi: 10.1007/BF00206326 |
[20] | DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor:The Second-Generation Onion Router[R]. Washington DC: Naval Research Lab, 2004. |
[21] | HILLER J, PENNEKAMP J, DAHLMANNS M, et al. Tailoring Onion Routing to the Internet of Things:Security and Privacy in Untrusted Environments[C]// 2019 IEEE 27th International Conference on Network Protocols (ICNP).Piscataway:IEEE, 2019:1-12. |
[22] |
XIA Y, CHEN R, SU J, et al. Balancing Anonymity and Resilience in Anonymous Communication Networks[J]. Computers & Security, 2021, 101:102106.
doi: 10.1016/j.cose.2020.102106 |
[23] | BAUER K, MCCOY D, GRUNWALD D, et al. Low-Resource Routing Attacks Against Tor[C]// Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society. New York: ACM, 2007:11-20. |
[1] | LI Haiyang,GUO Jingjing,LIU Jiuzun,LIU Zhiquan. Privacy preserving byzantine robust federated learning algorithm [J]. Journal of Xidian University, 2023, 50(4): 121-131. |
[2] | DING Hongfa,TANG Mingli,LIU Hai,JIANG Heling,FU Peiwang,YU Yingying. Model for protection of k-degree anonymity privacy under neighbor subgraph disturbance [J]. Journal of Xidian University, 2023, 50(4): 180-193. |
[3] | GUO Gang,YANG Chao,CHEN Mingzhe,MA Jianfeng. App traffic identification under ShadowSocksR proxy with machine learning [J]. Journal of Xidian University, 2023, 50(2): 138-146. |
[4] | AI Lulin, CHANG Zhengtai, FAN Wenbing, KONG Dehan. Lightweight RFID dual-tag authentication protocol using cloud and PUF [J]. Journal of Xidian University, 2023, 50(1): 177-191. |
[5] | WU Boyun,GU Wenjie,HE Xiandeng. Low-power consumption high-precision non-intrusive electrical appliance identification algorithm [J]. Journal of Xidian University, 2023, 50(1): 149-157. |
[6] | WANG Qiuling,HE Liaoliao,XU Hong,WEI Zi'ang,KE Yuhao,GUAN Wenying,ZHU Zhangyuan. Algorithm for sorting key nodes based on the fusion of local characteristics and global environment [J]. Journal of Xidian University, 2021, 48(6): 197-203. |
[7] | CHENG De,HAO Yi,ZHOU Jingyu,WANG Nannan,GAO Xinbo. Cross-modality person re-identification utilizing the hybrid two-stream neural networks [J]. Journal of Xidian University, 2021, 48(5): 190-200. |
[8] | SUN Yanjing,WEI Li,ZHANG Nianlong,YUN Xiao,DONG Kaiwen,GE Min,CHENG Xiaozhou,HOU Xiaofeng. Person re-identification method combining the DD-GAN and Global feature in a coal mine [J]. Journal of Xidian University, 2021, 48(5): 201-211. |
[9] | WEI Ziyu,YANG Xi,WANG Nannan,YANG Dong,GAO Xinbo. Reciprocal bi-directional generative adversarial network for cross-modal pedestrian re-identification [J]. Journal of Xidian University, 2021, 48(2): 205-212. |
[10] | FAN Meiyue,DONG Qingkuan,WANG Lei,YANG Can. TTP-free weighted muti-owner RFID tag authentication protocol [J]. Journal of Xidian University, 2021, 48(1): 133-140. |
[11] | LOU Ao,YAO Minli,JIA Weimin,YUAN Ding. Tent chaos and variable neighborhood local search optimized GSA [J]. Journal of Xidian University, 2019, 46(5): 120-127. |
[12] | WANG Yanfen,ZHU Xuran,YUN Xiao,SUN Yanjing,SHI Yunkai,WANG Sainan. Vehicle re-identification by multi-cameras for public security surveillance [J]. Journal of Xidian University, 2019, 46(4): 190-196. |
[13] | XING Tianzhang;XIE Binbin;YANG Kang;TANG Zhanyong;FANG Dingyi. Passive localization for multi-targets via wireless signal processing [J]. Journal of Xidian University, 2018, 45(1): 93-98. |
[14] | LI Tuanjie;LIU Weimeng;TANG Yaqiong;GAO Liqiang. Improved stochastic subspace method for identifying structural modal parameters [J]. Journal of Xidian University, 2017, 44(6): 26-30+58. |
[15] | LIU Changjiang;WAN Jian;HAN Jiesi;WEI Qiang. Passive browser identification based on the packet length [J]. Journal of Xidian University, 2017, 44(6): 144-149. |
|