메뉴 건너뛰기




Volumn 229, Issue , 2007, Pages 41-51

Usability of anonymous web browsing: An examination of Tor interfaces and deployability

Author keywords

Anonymity; Browsing; Onion routing; Privacy; Privoxy; Tor; Usable security

Indexed keywords

ANONYMITY; ONION ROUTING; TOR INTERFACES; USABLE SECURITY;

EID: 36849011539     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1280680.1280687     Document Type: Conference Paper
Times cited : (37)

References (26)
  • 1
    • 36849091543 scopus 로고    scopus 로고
    • Anonymity bibliography. In Freehaven. ONLINE: http://freehaven. net/anonbib/.
    • Anonymity bibliography. In Freehaven. ONLINE: http://freehaven. net/anonbib/.
  • 2
    • 84858503374 scopus 로고    scopus 로고
    • accessed Nov 2006
    • Foxyproxy 2.2.1 http://foxyproxy.mozdev.org (accessed Nov 2006).
    • Foxyproxy 2.2.1
  • 3
    • 84858502080 scopus 로고    scopus 로고
    • accessed Nov 2006
    • Privoxy 3.0.3 http://www.privoxy.org (accessed Nov 2006).
    • Privoxy 3.0.3
  • 4
    • 36849006068 scopus 로고    scopus 로고
    • Tor 0.1.1.25 http://tor.eff.org (accessed Nov 2006).
    • Tor 0.1.1.25 http://tor.eff.org (accessed Nov 2006).
  • 5
    • 84858501227 scopus 로고    scopus 로고
    • accessed Nov 2006
    • Torbutton 1.0.4 http://freehaven.net/s̃quires/torbutton/ (accessed Nov 2006).
    • Torbutton 1.0.4
  • 6
    • 84858484036 scopus 로고    scopus 로고
    • accessed Nov 2006
    • Torpark 1.5.0.7a http://www.torrify.com (accessed Nov 2006).
    • Torpark 1.5.0.7a
  • 7
    • 84858513739 scopus 로고    scopus 로고
    • accessed Nov 2006
    • Vidalia 0.0.7 http://vidalia-project.net (accessed Nov 2006).
    • , vol.7
    • Vidalia, 0.0.1
  • 8
    • 84937578170 scopus 로고    scopus 로고
    • Web MIXes: A system for anonymous and unobservable Internet access
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
    • O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 115-129. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , pp. 115-129
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3
  • 9
    • 34547269590 scopus 로고    scopus 로고
    • Psychological acceptability revisited
    • L. Cranor and S. Garfinkel, editors, O'Reilly
    • M. Bishop. Psychological acceptability revisited. In L. Cranor and S. Garfinkel, editors, Security and Usability, pages 1-12. O'Reilly, 2005.
    • (2005) Security and Usability , pp. 1-12
    • Bishop, M.1
  • 10
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM, volume 4, February 1981.
    • (1981) Communications of the ACM , vol.4
    • Chaum, D.1
  • 12
    • 34250768651 scopus 로고    scopus 로고
    • Privacy policies and privacy preferences
    • L. Cranor and S. Garfinkel, editors, O'Reilly
    • L. Cranor. Privacy policies and privacy preferences. In L. Cranor and S. Garfinkel, editors, Security and Usability, pages 447-472. O'Reilly, 2005.
    • (2005) Security and Usability , pp. 447-472
    • Cranor, L.1
  • 13
    • 34948873004 scopus 로고    scopus 로고
    • Anonymity loves company: Usability and the network effect
    • L. Cranor and S. Garfinkel, editors, O'Reilly
    • R. Dingledine and N. Mathewson. Anonymity loves company: usability and the network effect. In L. Cranor and S. Garfinkel, editors, Security and Usability, pages 547-560. O'Reilly, 2005.
    • (2005) Security and Usability , pp. 547-560
    • Dingledine, R.1    Mathewson, N.2
  • 15
    • 36849077744 scopus 로고    scopus 로고
    • Usability and privacy: A study of KaZaA P2P file sharing
    • L. Cranor and S. Garfinkel, editors, O'Reilly
    • N. Good and A. Krekelberg. Usability and privacy: A study of KaZaA P2P file sharing. In L. Cranor and S. Garfinkel, editors, Security and Usability, pages 651-667. O'Reilly, 2005.
    • (2005) Security and Usability , pp. 651-667
    • Good, N.1    Krekelberg, A.2
  • 16
    • 34547240740 scopus 로고    scopus 로고
    • Usability design and evaluation for privacy and security solutions
    • L. Cranor and S. Garfinkel, editors, O'Reilly
    • C. Karat, C. Brodie, and J. Karat. Usability design and evaluation for privacy and security solutions. In L. Cranor and S. Garfinkel, editors, Security and Usability, pages 47-74. O'Reilly, 2005.
    • (2005) Security and Usability , pp. 47-74
    • Karat, C.1    Brodie, C.2    Karat, J.3
  • 17
  • 18
    • 0031510222 scopus 로고    scopus 로고
    • Bidding on the future: Evidence against normative discounting of delayed rewards
    • K. Kirby. Bidding on the future: Evidence against normative discounting of delayed rewards. In Quarterly Journal of Experimental Psychology, pages 54-70. 126, 1997.
    • (1997) Quarterly Journal of Experimental Psychology , vol.126 , pp. 54-70
    • Kirby, K.1
  • 20
    • 34547324304 scopus 로고    scopus 로고
    • Internet geolocation and evasion
    • Technical Report TR-06-05. School of Computer Science, Carleton University, April
    • J. Muir and P. van Oorschot. Internet geolocation and evasion. In Technical Report TR-06-05. School of Computer Science, Carleton University, April 2006.
    • (2006)
    • Muir, J.1    van Oorschot, P.2
  • 22
    • 0001775576 scopus 로고
    • Heuristic evaluation
    • J. Nielsen and R. L. Mack, editors, Wiley & Sons
    • J. Nielson. Heuristic evaluation. In J. Nielsen and R. L. Mack, editors, Usability Inspection Methods, pages 25-64. Wiley & Sons, 1994.
    • (1994) Usability Inspection Methods , pp. 25-64
    • Nielson, J.1
  • 23
    • 0034782006 scopus 로고    scopus 로고
    • An investigation of geographic mapping techniques for internet hosts
    • V. Padmanabhan and L. Subramanian. An investigation of geographic mapping techniques for internet hosts. In Proceedings of SIGCOMM 2001, pages 173-185, 2001.
    • (2001) Proceedings of SIGCOMM 2001 , pp. 173-185
    • Padmanabhan, V.1    Subramanian, L.2
  • 24
    • 0000505675 scopus 로고
    • On the failure to eliminate hypotheses in a conceptual task
    • P. Wason. On the failure to eliminate hypotheses in a conceptual task. In Quarterly Journal of Experimental Psychology, pages 129-140. 12, 1960.
    • (1960) Quarterly Journal of Experimental Psychology , vol.12 , pp. 129-140
    • Wason, P.1
  • 25
    • 0001436725 scopus 로고
    • The cognitive walkthrough method: A practitioner's guide
    • J. Nielsen and R. L. Mack, editors, Wiley & Sons
    • C. Wharton, J. Rieman, C. Lewis, and P. Poison. The cognitive walkthrough method: A practitioner's guide. In J. Nielsen and R. L. Mack, editors, Usability Inspection Methods, pages 84-89. Wiley & Sons, 1994.
    • (1994) Usability Inspection Methods , pp. 84-89
    • Wharton, C.1    Rieman, J.2    Lewis, C.3    Poison, P.4
  • 26
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, 1999.
    • (1999) 8th USENIX Security Symposium
    • Whitten, A.1    Tygar, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.