Seeking anonymity in an internet panopticon
نویسندگان
چکیده
منابع مشابه
An Analysis of Anonymity on the Internet
Internet technologies bring with them a host of ramifications for the personal user, including a threat to personal privacy and anonymity. Anonymity and privacy are very closely integrated. Anonymity can be regarded as a way to protect one’s privacy. Third parties, providing Internet services, can record and collect user data in order to create user profiles. This is done in numerous ways, such...
متن کاملPlace of Internet in Health information seeking behavior: Case of young Internet users in Shiraz
Background and Aim: Nowadays, Internet is known as an attractive source of health information to manage individual's health. Given the importance of it, this study examined the role of Internet in health information seeking behavior among young people in Shiraz. Method: This research was a survey which target population were youth Internet users in the city of Shiraz. A sample of 400 we...
متن کاملProject "Anonymity and Unobservability in the Internet"
It is a hard problem to achieve anonymity for real-time services in the Internet (e.g. Web access). All existing concepts fail when we assume a very strong attacker model (i.e. an attacker is able to observe all communication links). We also show that these attacks are real-world attacks. This paper outlines alternative models which mostly render these attacks useless. Our present work tries to...
متن کاملCollaborative attack on Internet users' anonymity
Purpose – The purpose of this paper is to model and study the effectiveness of an attack on the anonymity of Internet users by a group of collaborating eavesdroppers. Design/methodology/approach – The paper is based on an analysis of the Internet topology. The study is based on two methods for choosing nodes that contribute the most to the detection of as many communicating Internet users as po...
متن کاملSome observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications of the ACM
سال: 2015
ISSN: 0001-0782,1557-7317
DOI: 10.1145/2714561