Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
Project “anonymity and unobservability in the Internet”
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Traffic analysis: protocols, attacks, design issues, and open problems
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Towards an analysis of onion routing security
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Privacy-enhancing technologies: approaches and development
Computer Standards & Interfaces
Statistical Identification of Encrypted Web Browsing Traffic
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Experiences Running a Web Anonymising Service
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Hidden surveillance by Web sites: Web bugs in contemporary use
Communications of the ACM - Mobile computing opportunities and challenges
Technology and Web User Data Privacy: A Survey of Risks and Countermeasures
IEEE Security and Privacy
Low-Cost Traffic Analysis of Tor
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Increasing User's Privacy Control through Flexible Web Bug Detection
LA-WEB '05 Proceedings of the Third Latin American Web Congress
Using caching for browsing anonymity
ACM SIGecom Exchanges
Protecting browser state from web privacy attacks
Proceedings of the 15th international conference on World Wide Web
VAST: versatile anonymous system for web users
Enhanced methods in computer security, biometric and artificial intelligence systems
Inferring the source of encrypted HTTP connections
Proceedings of the 13th ACM conference on Computer and communications security
JavaScript instrumentation for browser security
Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Defeating script injection attacks with browser-enforced embedded policies
Proceedings of the 16th international conference on World Wide Web
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Automatic Cookie Usage Setting with CookiePicker
DSN '07 Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Usability of anonymous web browsing: an examination of Tor interfaces and deployability
Proceedings of the 3rd symposium on Usable privacy and security
Proceedings of the 2007 ACM workshop on Privacy in electronic society
How much anonymity does network latency leak?
Proceedings of the 14th ACM conference on Computer and communications security
Performance Analysis of Anonymous Communication Channels Provided by Tor
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Privacy on the Web: Facts, Challenges, and Solutions
IEEE Security and Privacy
Performance Measurements and Statistics of Tor Hidden Services
SAINT '08 Proceedings of the 2008 International Symposium on Applications and the Internet
A secure and anonymous voter-controlled election scheme
Journal of Network and Computer Applications
Profit-aware overload protection in E-commerce Web sites
Journal of Network and Computer Applications
Privacy diffusion on the web: a longitudinal perspective
Proceedings of the 18th international conference on World wide web
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Preserving user's privacy in web search engines
Computer Communications
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
A framework for identity privacy in SIP
Journal of Network and Computer Applications
Proceedings of the 2009 ACM workshop on Cloud computing security
How much anonymity does network latency leak?
ACM Transactions on Information and System Security (TISSEC)
Survey on anonymous communications in computer networks
Computer Communications
Analyzing Information Flow in JavaScript-Based Browser Extensions
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Fingerprinting websites using traffic analysis
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Sampled traffic analysis by internet-exchange-level adversaries
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Web Tracking Site Detection Based on Temporal Link Analysis
WAINA '10 Proceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
An automatic HTTP cookie management system
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information Flow Monitor Inlining
CSF '10 Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium
An empirical study of privacy-violating information flows in JavaScript web applications
Proceedings of the 17th ACM conference on Computer and communications security
Anonymity and monitoring: how to monitor the infrastructure of an anonymity system
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
How unique is your web browser?
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network
NSS '10 Proceedings of the 2010 Fourth International Conference on Network and System Security
An analysis of private browsing modes in modern browsers
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Peering through the shroud: the effect of edge opacity on ip-based client identification
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
An analysis of anonymity technology usage
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Low latency anonymous communication: how long are users willing to wait?
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Privacy enhanced technologies: methods – markets – misuse
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Cryptographic protocol analysis of AN.ON
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Privacy vulnerabilities in encrypted HTTP streams
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Malice versus AN.ON: possible risks of missing replay and integrity protection
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Concern for privacy when users are surfing on the Web has increased recently. Nowadays, many users are aware that when they are accessing Web sites, these Web sites can track them and create profiles on the elements they access, the advertisements they see, the different links they visit, from which Web sites they come from and to which sites they exit, and so on. In order to maintain user privacy, several techniques, methods and solutions have appeared. In this paper we present an analysis of both these solutions and the main tools that are freely distributed or can be used freely and that implement some of these techniques and methods to preserve privacy when users and surfing on the Internet. This work, unlike previous reviews, shows in a comprehensive way, all the different risks when a user navigates on the Web, the different solutions proposed that finally have being implemented and being used to achieve Web privacy goal. Thus, users can decide which tools to use when they want navigate privately and what kind of risks they are assuming.