2009 World Congress on Privacy, Security, Trust and the Management of E-Business 2009
DOI: 10.1109/congress.2009.38
|View full text |Cite
|
Sign up to set email alerts
|

Usability Inspection of Anonymity Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Moreover, active monitoring is carried out and cut off all requests to the banned sites. Required to overcome opposition from the network equipment, and gain access to arbitrary resources, in particular site [1][2][3][4][5].…”
Section: Problemmentioning
confidence: 99%
“…Moreover, active monitoring is carried out and cut off all requests to the banned sites. Required to overcome opposition from the network equipment, and gain access to arbitrary resources, in particular site [1][2][3][4][5].…”
Section: Problemmentioning
confidence: 99%
“…Very few research works focused over the sociability issues of Tor network. Discussed challenges and social issues, and studied Tor network Abou-Tair et al [112] Studied usability, bandwidth and anonymity over anonymous networks Clark et al [113] Performed usability analysis of Tor with other anonymity tools Edmundson et al [114] Compared anonymity and performance of Safeplug with Tor…”
Section: Tor Analysis and Performance Improvementsmentioning
confidence: 99%
“…Who is More User Friendly ? Abou-Tair et al [112] focused on the usability of different anonymizing solutions including Tor, I2P 6 , JAP/JonDo (Java Anonymous Proxy) 7 and Mixmaster 8 . The installation of all softwares was analyzed with regard to ease-of-use.…”
Section: General Studies Of Tormentioning
confidence: 99%
See 1 more Smart Citation
“…The Tor browser has been designed to be straightforward for the general user to use [19,20] and modified many attributes on the Firefox browser in order to preserve the user privacy, below [21]. Tor has been praised by many researchers because of the high levels of privacy provided.…”
Section: ) Share Fingerprinting With Othersmentioning
confidence: 99%