資源描述:
《tor匿名通信技術(shù)的研究》由會員上傳分享,免費在線閱讀,更多相關(guān)內(nèi)容在學(xué)術(shù)論文-天天文庫。
1、哈爾濱工業(yè)大學(xué)工學(xué)碩士學(xué)位論文Moreover,italsoanalyzedthatthereleasedmechanismofanonymousresourcesmakeinfluenceontheanonymityofanonymoussystem.Meanwhile,itputforwardtheexpansionproposalsonenumerateddiscoverymechanismofanonymouscommunicationresources,improvedtheabilitythatthehostilenodesmaliciouslycol
2、lectedsystemresourcessoastoprotecttheanonymityofanonymoussystemfromdamage.Inordertograspthedistributionandexistenceconditionofanonymoussystemresources,thepaperdesignedanactivedetectingstrategyofanonymouscommunicationresources,achievedthesimulateddetectionsystemofanonymousresourcesandm
3、adefunctionalverificationonresourcedetectionandroutenodesofTornetwork.Meanwhile,accordingtotheexperimentaldata,itanalyzedtheresourcesdistributionofTornetwork.Andmadeanevaluationaccordingly,suchasontheaspectsoftheoperatingperformanceandsecurityofTornetwork,etc.Keywords:Anonymouscommuni
4、cation;TOR;Resourcepublic-III-哈爾濱工業(yè)大學(xué)工學(xué)碩士學(xué)位論文目錄摘要......................................................................................................................IAbstract.............................................................................................................
5、...II第1章緒論.........................................................................................................11.1課題研究的背景和意義............................................................................11.2匿名通信系統(tǒng)研究現(xiàn)狀..................................................................
6、..........21.2.1匿名通信介紹.....................................................................................21.2.2匿名技術(shù)的發(fā)展.................................................................................21.2.3匿名通信系統(tǒng)分類......................................................................
7、.......41.3課題主要研究內(nèi)容....................................................................................51.4論文組織....................................................................................................6第2章Tor匿名通信技術(shù).............................................................
8、.....