1999
DOI: 10.1145/293411.293447
|View full text |Cite
|
Sign up to set email alerts
|

Consistent, yet anonymous, Web access with LPWA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
51
0

Year Published

2001
2001
2012
2012

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 73 publications
(51 citation statements)
references
References 6 publications
0
51
0
Order By: Relevance
“…Chou et al introduced one such tool SpoofGuard [2], that determines if a web page is legitimate based on a series of domain and URL based tests. Gabber et al present a tool [10], that tries to protect a clients identity and password information. They define client persona in terms of username, password and email address and introduce a function which provides a client with different persona for different servers it visits.…”
Section: Related Workmentioning
confidence: 99%
“…Chou et al introduced one such tool SpoofGuard [2], that determines if a web page is legitimate based on a series of domain and URL based tests. Gabber et al present a tool [10], that tries to protect a clients identity and password information. They define client persona in terms of username, password and email address and introduce a function which provides a client with different persona for different servers it visits.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the Web proxy hides the IP information of the user that is originating the request. However, the trace of all the traffic that is originated in and have as destination the proxy might reveal user's identity even SSL/TLS is used (Gabber et al, 1999;Danezis and Diaz, 2008;Li et al, 2011). Furthermore, the Web proxy knows all the information and can trace user's activity (Margasiński and Szczypiorski, 2005).…”
Section: Privacy Solutions For Tcp/ip Layermentioning
confidence: 99%
“…Systems like Anonymizer [5], Lucent Personalized Web Assistant [6], PRA:Proxy for Responder Anonymity [12] and APFS Unicast [12] use an intermediate proxy to provide anonymity. As these systems trust the proxy for performance and anonymity guarantees, they are vulnerable to failure if the proxy is compromised or if the proxy fails.…”
Section: Anonymity By Proxymentioning
confidence: 99%
“…If A cannot decrypt the message then A performs one of two actions: it may just add the header to its header buffer or with some probability p inter it may go back and get the corresponding MSG from B. In the first case, A gossips with its neighbors that 6 This assumption holds true in applications with large responses (e.g. file-transfer and web-browsing).…”
Section: Data Dissemination In Muonmentioning
confidence: 99%
See 1 more Smart Citation