The design, implementation and operation of an email pseudonym server
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Communications of the ACM
The platform for privacy preferences
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
Communications of the ACM
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Proceedings of the First International Workshop on Information Hiding
Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
ACM Transactions on Internet Technology (TOIT)
The pynchon gate: a secure method of pseudonymous mail retrieval
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Towards a framework for connection anonymity
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Online information disclosure: Motivators and measurements
ACM Transactions on Internet Technology (TOIT)
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
A privacy augmented collaborative environment (PACE)
ACS'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7
P2P Networking and Applications
P2P Networking and Applications
Proving a Shuffle Using Representations of the Symmetric Group
Information Security and Cryptology --- ICISC 2008
Short Survey: Privacy-enhancing technologies for the world wide web
Computer Communications
Privacy-enhanced web personalization
The adaptive web
One-time receiver address in IPv6 for protecting unlinkability
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A framework for the lived experience of identity
Identity in the Information Society
Quantum anonymous transmissions
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Onion Routing: Fun with onion routing
Network Security
Authorization architectures for privacy-respecting surveillance
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |
Five years ago, "Privacy-enhancing technologies for the Internet" [23] examined the state of the then newly emerging privacy-enhancing technologies. In this survey paper, we look back at the last five years to see what has changed, what has stagnated, what has succeeded, what has failed, and why. We also look at current trends with a view towards the future.