Communications of the ACM
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
The platform for privacy preferences
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Masks: Bringing Anonymity and Personalization Together
IEEE Security and Privacy
Receiver anonymity via incomparable public keys
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 13th international conference on World Wide Web
Usable presentation of secure pseudonyms
Proceedings of the 2005 workshop on Digital identity management
Email alias detection using social network analysis
Proceedings of the 3rd international workshop on Link discovery
Obfuscating document stylometry to preserve author anonymity
COLING-ACL '06 Proceedings of the COLING/ACL on Main conference poster sessions
Stylometric Identification in Electronic Markets: Scalability and Robustness
Journal of Management Information Systems
Linking Privacy and User Preferences in the Identity Management for a Pervasive System
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
Privacy enhancing profile disclosure
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Privacy-enhanced web personalization
The adaptive web
Practical traffic analysis: extending and resisting statistical disclosure
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Secure identity management for pseudo-anonymous service access
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Use fewer instances of the letter "i": toward writing style anonymization
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity
ACM Transactions on Information and System Security (TISSEC)
A PLA-based privacy-enhancing user modeling framework and its evaluation
User Modeling and User-Adapted Interaction
What's in a name?: an unsupervised approach to link users across communities
Proceedings of the sixth ACM international conference on Web search and data mining
Detecting multiple aliases in social media
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
A Taxonomy of Censors and Anti-Censors Part II: Anti-Censorship Technologies
International Journal of E-Politics
Hi-index | 0.00 |
One of the core challenges facing the Internet today is the problem of ensuring privacy for its users. It is believed that mechanisms such as anonymity and pseudonymity are essential building blocks in formulating solutions to address these challenges and considerable effort has been devoted towards realizing these primitives in practice. The focus of this effort, however, has mostly been on hiding explicit identify information (such as source addresses) by employing a combination of anonymizing proxies, cryptographic techniques to distribute trust among them and traffic shaping techniques to defeat traffic analysis. We claim that such approaches ignore a significant amount of identifying information about the source that leaks from the contents of web traffic itself. In this paper, we demonstrate the significance and value of such information by showing how techniques from linguistics and stylometry can use this information to compromise pseudonymity in several important settings. We discuss the severity of this problem and suggest possible countermeasures.