Bridging the gap between anonymous e‐mail and anonymous web browsing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bridging the gap between anonymous e-mail and anonymous web browsing

Purpose – Anonymity research on high latency, store-and-forward mediums, such as e-mail, have led to comparatively well-researched anonymity technologies; however, similar achievements have proven to be more difficult for low-latency communications such as Web browsing. This paper aims to propose an anonymous Web browsing protocol that harnesses some of the advantages of a store-and-forward ano...

متن کامل

How to Make Personalized Web Browsing Simple Secure and Anonymous

An increasing number of web sites require users to establish an account before they can access the information stored on that site personalized web browsing Typically the user is required to provide at least a unique username a secret password and an e mail address Establishing accounts at multiple web sites is a tedious task A security and privacy aware user may have to invent a distinct usern...

متن کامل

gap - Practical Anonymous Networking

This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based ...

متن کامل

Pseudo An Anonymous Email Relay Server

Modern secure email protocol relies on PGP encryption to ensure privacy. However, while PGP can confirm message body authenticity and privacy, it fails to provide anonymity. This is because it leaves all identifying headers of an email such as IP and email addresses in plain text. As a result, users are often left vulnerable when communicating with compromised machines. We propose Pseudo, an SM...

متن کامل

Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics

The majority of current anonymous systems focus on improving anonymity at the network and website level in order to defend against traffic analysis attacks. However, the vulnerability of the connections between end users and the anonymous network do not attract any attention yet. For the first time, we reveal an end user browsing dynamics based attack on anonymous browsing systems at the LAN wh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Online Information Review

سال: 2008

ISSN: 1468-4527

DOI: 10.1108/14684520810865967