W De la Cadena, D Kaiser, A Mitseva… - Data and Applications …, 2019 - Springer
Anonymization networks (eg, Tor) help in protecting the privacy of Internet users. However, the benefit of privacy protection comes at the cost of severe performance loss. This …
RA Haraty, B Zantout - Computers in Human Behavior, 2015 - Elsevier
The paper introduces a new collaborative technique for assuring data integrity while avoiding traffic analysis and other types of similar attacks (eg, man-in-the-middle, data …
M Marx, M Schwarz, M Blochberger, F Wille… - … Conference, ICICS 2019 …, 2020 - Springer
Different web browsers have developed approaches to better isolate the activities of users on different websites. However, those only work on the application-level and using the user's …
M Mulazzani - 2014, 2014 - publications.sba-research.org
This thesis is based on seven publications related to the area of digital forensics which were published at conferences or in journals by ACM, IEEE, USENIX and IFIP. Digital forensics as …
A Lux, F Platzer - Selbstbestimmung, Privatheit und Datenschutz …, 2022 - library.oapen.org
Ziel der vorliegenden Arbeit ist die Erstellung einer Anonymitätsmatrix. Der Fokus liegt hierbei insbesondere in der Verbindung der technischen und psychologischen …
The main goal of multilayer-encryption anonymity networks is to provide a certain level of privacy to their users. At the same time, such networks could be misused to perform harmful …
K Shahbar, AN Zincir-Heywood - … , FPS 2017, Nancy, France, October 23 …, 2018 - Springer
Many systems provide anonymity for their users, and most of these systems work on the separation between the users' identity and the final destination. The level of anonymity these …
T Ries, R State, T Engel - 2011 11th International Symposium …, 2011 - ieeexplore.ieee.org
Popularity and awareness of anonymisation systems increased tremendously over the past years, however only a very few systems made it from research to production. These systems …