{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:03:55Z","timestamp":1754161435346,"version":"3.41.2"},"reference-count":18,"publisher":"Emerald","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,12,20]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>As a peer-to-peer scalable anonymous communication system, WonGoo is a tradeoff between anonymity and efficiency. Usually, the longer the path, the stronger the anonymity, but at the same time the heavier the overhead. WonGoo lengthens the anonymity path and reduces the overhead, providing strong anonymity and high efficiency with layered encryption and random forwarding. The purpose of this paper is to analyze its performance in detail.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>The paper focuses on measure the performance of WonGoo system with probability theory. First, it gives a brief description of the system and evaluate its payload. Then it presents a detailed security analysis of the system.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>It is shown that WonGoo can protect against (n\u2009\u2212\u20091) attack and provide variable anonymity, as well as how confident the collaborators can be that their immediate predecessor is in fact the path initiator. The paper measures the anonymity degree provided by WonGoo system based on information entropy and compare it with other anonymity systems.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Practical implications<\/jats:title>\n                  <jats:p>The paper is helpful for the further development of WonGoo system. In addition, the results presented in this paper will be useful for users to design other anonymity system.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>WonGoo is a peer-to-peer anonymity system that provides strong anonymity and high efficiency with layered encryption and random forwarding. The paper presents a detailed analysis of its performance with probability theory and measures its anonymity degree with information theory.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/17427370710847291","type":"journal-article","created":{"date-parts":[[2008,1,12]],"date-time":"2008-01-12T07:05:29Z","timestamp":1200121529000},"page":"159-174","source":"Crossref","is-referenced-by-count":0,"title":["Towards an analysis of WonGoo performance"],"prefix":"10.1108","volume":"3","author":[{"given":"Tianbo","family":"Lu","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China, Beijing, People's Republic of China"}]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, People's Republic of China"}]},{"given":"Yuzhong","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, People's Republic of China"}]},{"given":"Xueqi","family":"Cheng","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, People's Republic of China"}]}],"member":"140","reference":[{"key":"2025072819280113500_b1","unstructured":"Boucher, P.\n          , Shostack, A. and Goldberg, I. (2000), \u201cFreedom systems 2.0 architecture\u201d, December, available at: www.freedom.net\/"},{"issue":"2","key":"2025072819280113500_b2","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Communications of the ACM"},{"key":"2025072819280113500_b3","doi-asserted-by":"crossref","unstructured":"Danezis, G.\n           and Sassaman, L. (2003), \u201cHeartbeat traffic to counter (n\u2009 \u2212\u2009 1) attacks\u201d, Proceedings of the Workshop on Privacy in the Electronic Society (WPES), Washington, DC, October, pp. 89-93.","DOI":"10.1145\/1005140.1005154"},{"key":"2025072819280113500_b4","doi-asserted-by":"crossref","unstructured":"Danezis, G.\n          , Dingledine, R. and Mathewson, N. (2003), \u201cMixminion: design of a type III anonymous remailer protocol\u201d, Proceedings of the 2003 IEEE Symposium on Security and Privacy, Oakland, California, May, pp. 2-15.","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"2025072819280113500_b5","doi-asserted-by":"crossref","unstructured":"D\u00edaz, C.\n          , Seys, S., Claessens, J. and Preneel, B. (2002), \u201cTowards measuring anonymity\u201d, Proceedings of Privacy Enhancing Technologies Workshop (PET), Oakland, California, April, pp. 54-68.","DOI":"10.1007\/3-540-36467-6_5"},{"key":"2025072819280113500_b6","doi-asserted-by":"crossref","unstructured":"Dingledine, R.\n          , Mathewson, N. and Syverson, P. (2004), \u201cTor: the second-generation onion router\u201d, Proceedings of the 13th USENIX Security Symposium, San Diego, CA, August, pp. 303-20.","DOI":"10.21236\/ADA465464"},{"key":"2025072819280113500_b7","doi-asserted-by":"crossref","unstructured":"Freedman, M.\n           and Morris, R. (2002), \u201cTarzan: a peer-to-peer anonymizing network layer\u201d, Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), Washington, DC, November, pp. 193-206.","DOI":"10.1145\/586110.586137"},{"key":"2025072819280113500_b8","doi-asserted-by":"crossref","unstructured":"G\u00fclc\u00fc, C.\n           and Tsudik, G. (1996), \u201cMixing E-mail with BABEL\u201d, Proceedings of the Network and Distributed Security Symposium (NDSS), San Diego, CA, February, pp. 2-16.","DOI":"10.1109\/NDSS.1996.492350"},{"key":"2025072819280113500_b9","doi-asserted-by":"crossref","unstructured":"Kesdogan, D.\n          , Egner, J. and B\u00fcschkes, R. (1998), \u201cStop-and-Go MIXes: providing probabilistic anonymity in an open system\u201d, Proceedings of Information Hiding Workshop (IH), Portland, Oregon, LNCS 1525, pp. 83-98.","DOI":"10.1007\/3-540-49380-8_7"},{"key":"2025072819280113500_b10","unstructured":"Lu, T.\n          , Fang, B., Sun, Y. and Cheng, X. (2004), \u201cWonGoo: a peer-to-peer protocol for anonymous communication\u201d, Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, Nevada, June, pp. 1102-6."},{"key":"2025072819280113500_b11","unstructured":"M\u00f6ller, U.\n          , Cottrell, L., Palfrader, P. and Sassaman, L. (2003), \u201cMixmaster Protocol-Version 2 Draft\u201d, July, available at: www.abditum.com\/mixmaster-spec.txt"},{"key":"2025072819280113500_b12","doi-asserted-by":"crossref","unstructured":"Park, C.\n          , Itoh, K. and Kurosawa, K. (1993), \u201cEfficient anonymous channel and all\/nothing election scheme\u201d, Proceedings of Eurocrypt, Lofthus, Norway, LNCS 765, pp. 248-59.","DOI":"10.1007\/3-540-48285-7_21"},{"key":"2025072819280113500_b13","unstructured":"Pfitzmann, A.\n           and K\u00f6hntopp, M. (2003), \u201cAnonymity, unobservability, and pseudonymity \u2013 a proposal for terminology, Draft v0.14\u201d, May, available at: www.freehaven.net\/anonbib\/papers\/"},{"issue":"4","key":"2025072819280113500_b14","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1109\/49.668972","article-title":"anonymous connections and onion routing","volume":"16","author":"Reed","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"2025072819280113500_b15","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","article-title":"Crowds: anonymity for web transactions","volume":"1","author":"Reiter","year":"1998","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"2025072819280113500_b16","doi-asserted-by":"crossref","unstructured":"Rennhard, M.\n           and Plattner, B. (2002), \u201cIntroducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection\u201d, Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES), Washington, DC, November, pp. 91-102.","DOI":"10.1145\/644527.644537"},{"key":"2025072819280113500_b17","doi-asserted-by":"crossref","unstructured":"Serjantov, A.\n           and Danezis, G. (2002), \u201cTowards an information theoretic metric for anonymity\u201d, Proceedings of Privacy Enhancing Technologies Workshop (PET), San Francisco, CA, April, pp. 41-53.","DOI":"10.1007\/3-540-36467-6_4"},{"issue":"2","key":"2025072819280113500_b18","first-page":"278","article-title":"Payload analysis of rerouting-based anonymous communication systems","volume":"15","author":"Sui","year":"2004","journal-title":"Journal of Software"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/17427370710847291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ijpcc\/article-pdf\/3\/2\/159\/1099767\/17427370710847291.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ijpcc\/article-pdf\/3\/2\/159\/1099767\/17427370710847291.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:28:11Z","timestamp":1753745291000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ijpcc\/article\/3\/2\/159\/161924\/Towards-an-analysis-of-WonGoo-performance"}},"subtitle":[],"editor":[{"given":"Daming","family":"Wei","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2007,12,20]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,12,20]]}},"URL":"https:\/\/doi.org\/10.1108\/17427370710847291","relation":{},"ISSN":["1742-7371","1742-738X"],"issn-type":[{"type":"print","value":"1742-7371"},{"type":"electronic","value":"1742-738X"}],"subject":[],"published":{"date-parts":[[2007,12,20]]}}}