Access the full text.
Sign up today, get DeepDyve free for 14 days.
Oliver Berthold, H. Federrath, S. Köpsell (2000)
Web MIXes: A System for Anonymous and Unobservable Internet Access
I. Goldberg (2002)
Privacy-Enhancing Technologies for the Internet, II: Five Years Later
(2002)
Doubleclick’s double edge”, http://www.clickz.com/experts/crm/ analyze/data/article.php/1455141
Carl Worth (2002)
Proceedings of the Freenix Track: 2003 Usenix Annual Technical Conference Xstroke: Full-screen Gesture Recognition for X
M. Freedman, R. Morris (2002)
Tarzan: a peer-to-peer anonymizing network layer
Joseph Reagle, L. Cranor (1999)
The platform for privacy preferencesCommun. ACM, 42
Claudia Díaz, B. Preneel (2004)
Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic
M. Reiter, A. Rubin (1998)
Crowds: anonymity for Web transactionsACM Trans. Inf. Syst. Secur., 1
Tim Berners-Lee, R. Fielding, H. Nielsen (1997)
Hypertext Transfer Protocol - HTTP/1.1RFC, 2068
(2000)
Freedom systems 2.0 architecture”, Whitepaper, Zero Knowledge Systems, Inc
(2006)
Polar: Proxies collaborating to achieve anonymous communication”, Master’s thesis, University of Pretoria
W.W.Y. Chung, J. Paynter (2002)
Privacy issues on the InternetProceedings of the 35th Annual Hawaii International Conference on System Sciences
M. Reed, P. Syverson, D. Goldschlag (1997)
Anonymous connections and onion routingProceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
D. Goldschlag, M. Reed, P. Syverson (1996)
Hiding Routing Information
M. Reiter, A. Rubin (1999)
Anonymous Web transactions with CrowdsCommun. ACM, 42
Roger Dingledine, Nick Mathewson (2006)
Anonymity Loves Company: Usability and the Network Effect
D. Chaum (1981)
Untraceable electronic mail, return addresses, and digital pseudonyms
Claudia Díaz, B. Preneel (2004)
Taxonomy of Mixes and Dummy Traffic
(1996)
Johan Helsingius closes his Internet remailer”, http://www.fitug.de/ news/1997/penet.html
(2000)
Confidentiality and anonymity analysis of on-line payment protocols
(1997)
A brief history of anon.penet.fi - the legendary anonymous remailer”, http://www.december.com/cmc/mag/1997/sep/helmers.html
H. Aljifri, Diego Navarro (2004)
Search engines and privacyComput. Secur., 23
(2006)
The ethics of using AOL search data”, http://arstechnica.com/news .ars/post/20060823-7578.htm
Tim Berners-Lee, R. Fielding, H. Nielsen (1993)
Hypertext transfer protocol--http/i
Ye Qian (2004)
Hypertext Transfer Protocol——HTTP/1.0
Heiko Tillwick, M. Olivier (2005)
Towards a framework for connection anonymity
Sameer Parekh (1996)
Prospects for RemailersFirst Monday, 1
Purpose – This paper aims to propose an anonymous web‐browsing protocol that harnesses some of the advantages of store‐and‐forward anonymity solutions whilst retaining some of the interactive properties of web browsing. Anonymity research on high latency, store‐and‐forward mediums such as e‐mail have led to comparatively well‐researched anonymity technologies. However, similar achievements have proven to be more difficult for low‐latency communications such as web browsing. Design/methodology/approach – A review of existing anonymity solutions notes the advantages of mix technologies versus the advantages offered by Onion Routing. A solution is presented that features a combined approach of both solutions. Findings – The proposed protocol differentiates between web requests and web responses – a request is treated as a store‐and‐forward message whilst the response is handled as a data stream. Originality/value – The solution described can be used by existing anonymous web browsing solutions in order to improve the level of anonymity whilst minimising the overhead of anonymously distributing web content.
Online Information Review – Emerald Publishing
Published: Feb 22, 2008
Keywords: Worldwide web; Privacy; Electronic mail
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.