Networks without user observability—design options
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
An efficient fair payment system
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Summary of WWW characterizations
WWW7 Proceedings of the seventh international conference on World Wide Web 7
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead
Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung
Modeling the Clickstream: Implications for Web-Based Advertising Efforts
Marketing Science
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
Discriminative Training for Object Recognition Using Image Patches
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 2 - Volume 02
IEEE Security and Privacy
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Usability of anonymous web browsing: an examination of Tor interfaces and deployability
Proceedings of the 3rd symposium on Usable privacy and security
Shining Light in Dark Places: Understanding the Tor Network
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Privacy enhanced technologies: methods – markets – misuse
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
The market failure of anonymity services
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Hi-index | 0.00 |
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has not emerged as of today. One possibility to stimulate adoption is to facilitate it in a specific subnet. The idea is to identify a promising target group which has a substantial benefit from adopting the technology and to facilitate the adoption within that target group. We examine the feasibility of this approach for anonymity services. We identify a potential target group --- consumers of pornographic online material --- and empirically validate their suitability by conducting a traffic analysis. We also discuss several business models for anonymity services. We argue that providers of anonymity services should try to generate revenue from content providers like adult entertainment distributors. The latter could benefit from offering anonymous access to their products by differentiating against competitors or by selling their products at a higher price over the anonymous channel.