2012
DOI: 10.1016/j.jnca.2012.02.011
|View full text |Cite
|
Sign up to set email alerts
|

A survey on solutions and main free tools for privacy enhancing Web communications

Abstract: Concern for privacy when users are surfing on the Web has increased recently. Nowadays, many users are aware that when they are accessing Web sites, these Web sites can track them and create profiles on the elements they access, the advertisements they see, the different links they visit, from which Web sites they come from and to which sites they exit, and so on. In order to maintain user privacy, several techniques, methods and solutions have appeared. In this paper we present an analysis of both these solut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(11 citation statements)
references
References 47 publications
0
11
0
Order By: Relevance
“…Even if not specifically designed for censorship circumvention, anonymity technologies can and have been used to circumvent censorship: a recent survey on usage of several technologies including proxy servers, remailers, overlay networks such as JAP (Köpsell et al [92]), I2P (Schomburg [135]), and Tor (Dingledine et al [46]) is provided by Li et al [102]. 4 Specifically dealing with web browsing activities, a survey on "privacy enhancing" tools is presented by Ruiz-Martínez [133]. A comprehensive source for academic literature on anonymity is the structured bibliography page of the Free Haven project [59].…”
Section: Network-based Censorshipmentioning
confidence: 99%
“…Even if not specifically designed for censorship circumvention, anonymity technologies can and have been used to circumvent censorship: a recent survey on usage of several technologies including proxy servers, remailers, overlay networks such as JAP (Köpsell et al [92]), I2P (Schomburg [135]), and Tor (Dingledine et al [46]) is provided by Li et al [102]. 4 Specifically dealing with web browsing activities, a survey on "privacy enhancing" tools is presented by Ruiz-Martínez [133]. A comprehensive source for academic literature on anonymity is the structured bibliography page of the Free Haven project [59].…”
Section: Network-based Censorshipmentioning
confidence: 99%
“…Tor not only can hide the user's location but also can protect the entire information being transferred using encryption [17,18]. Tor sends user information through a number of Tor servers located around the world, provided by a voluntary basis (to provide a public service).…”
Section: ) Share Fingerprinting With Othersmentioning
confidence: 99%
“…Initially interest in this field was primarily theoretical but in the last 30 years a lot of research in this field has looked at developing practical and usable systems for preserving anonymity [10,11]. Such systems include Mixmaster [12], Mixminion [13], TOR [14], I2P [15] and many others which are actively under development.…”
Section: Firewalls and Intrusion Detec-tion Systemsmentioning
confidence: 99%