Seeking anonymity in an internet panopticon

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Analysis of Anonymity on the Internet

Internet technologies bring with them a host of ramifications for the personal user, including a threat to personal privacy and anonymity. Anonymity and privacy are very closely integrated. Anonymity can be regarded as a way to protect one’s privacy. Third parties, providing Internet services, can record and collect user data in order to create user profiles. This is done in numerous ways, such...

متن کامل

Place of Internet in Health information seeking behavior: Case of young Internet users in Shiraz

Background and Aim: Nowadays, Internet is known as an attractive source of health information to manage individual's health.  Given the importance of it, this study examined the role of Internet in health information seeking behavior among young people in Shiraz.      Method: This research was a survey which target population were youth Internet users in the city of Shiraz.  A sample of 400 we...

متن کامل

Project "Anonymity and Unobservability in the Internet"

It is a hard problem to achieve anonymity for real-time services in the Internet (e.g. Web access). All existing concepts fail when we assume a very strong attacker model (i.e. an attacker is able to observe all communication links). We also show that these attacks are real-world attacks. This paper outlines alternative models which mostly render these attacks useless. Our present work tries to...

متن کامل

Collaborative attack on Internet users' anonymity

Purpose – The purpose of this paper is to model and study the effectiveness of an attack on the anonymity of Internet users by a group of collaborating eavesdroppers. Design/methodology/approach – The paper is based on an analysis of the Internet topology. The study is based on two methods for choosing nodes that contribute the most to the detection of as many communicating Internet users as po...

متن کامل

Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications of the ACM

سال: 2015

ISSN: 0001-0782,1557-7317

DOI: 10.1145/2714561