-
1
-
-
36849091543
-
-
Anonymity bibliography. In Freehaven. ONLINE: http://freehaven. net/anonbib/.
-
Anonymity bibliography. In Freehaven. ONLINE: http://freehaven. net/anonbib/.
-
-
-
-
2
-
-
84858503374
-
-
accessed Nov 2006
-
Foxyproxy 2.2.1 http://foxyproxy.mozdev.org (accessed Nov 2006).
-
Foxyproxy 2.2.1
-
-
-
3
-
-
84858502080
-
-
accessed Nov 2006
-
Privoxy 3.0.3 http://www.privoxy.org (accessed Nov 2006).
-
Privoxy 3.0.3
-
-
-
4
-
-
36849006068
-
-
Tor 0.1.1.25 http://tor.eff.org (accessed Nov 2006).
-
Tor 0.1.1.25 http://tor.eff.org (accessed Nov 2006).
-
-
-
-
5
-
-
84858501227
-
-
accessed Nov 2006
-
Torbutton 1.0.4 http://freehaven.net/s̃quires/torbutton/ (accessed Nov 2006).
-
Torbutton 1.0.4
-
-
-
6
-
-
84858484036
-
-
accessed Nov 2006
-
Torpark 1.5.0.7a http://www.torrify.com (accessed Nov 2006).
-
Torpark 1.5.0.7a
-
-
-
7
-
-
84858513739
-
-
accessed Nov 2006
-
Vidalia 0.0.7 http://vidalia-project.net (accessed Nov 2006).
-
, vol.7
-
-
Vidalia, 0.0.1
-
8
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
-
O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 115-129. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
9
-
-
34547269590
-
Psychological acceptability revisited
-
L. Cranor and S. Garfinkel, editors, O'Reilly
-
M. Bishop. Psychological acceptability revisited. In L. Cranor and S. Garfinkel, editors, Security and Usability, pages 1-12. O'Reilly, 2005.
-
(2005)
Security and Usability
, pp. 1-12
-
-
Bishop, M.1
-
10
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM, volume 4, February 1981.
-
(1981)
Communications of the ACM
, vol.4
-
-
Chaum, D.1
-
12
-
-
34250768651
-
Privacy policies and privacy preferences
-
L. Cranor and S. Garfinkel, editors, O'Reilly
-
L. Cranor. Privacy policies and privacy preferences. In L. Cranor and S. Garfinkel, editors, Security and Usability, pages 447-472. O'Reilly, 2005.
-
(2005)
Security and Usability
, pp. 447-472
-
-
Cranor, L.1
-
13
-
-
34948873004
-
Anonymity loves company: Usability and the network effect
-
L. Cranor and S. Garfinkel, editors, O'Reilly
-
R. Dingledine and N. Mathewson. Anonymity loves company: usability and the network effect. In L. Cranor and S. Garfinkel, editors, Security and Usability, pages 547-560. O'Reilly, 2005.
-
(2005)
Security and Usability
, pp. 547-560
-
-
Dingledine, R.1
Mathewson, N.2
-
15
-
-
36849077744
-
Usability and privacy: A study of KaZaA P2P file sharing
-
L. Cranor and S. Garfinkel, editors, O'Reilly
-
N. Good and A. Krekelberg. Usability and privacy: A study of KaZaA P2P file sharing. In L. Cranor and S. Garfinkel, editors, Security and Usability, pages 651-667. O'Reilly, 2005.
-
(2005)
Security and Usability
, pp. 651-667
-
-
Good, N.1
Krekelberg, A.2
-
16
-
-
34547240740
-
Usability design and evaluation for privacy and security solutions
-
L. Cranor and S. Garfinkel, editors, O'Reilly
-
C. Karat, C. Brodie, and J. Karat. Usability design and evaluation for privacy and security solutions. In L. Cranor and S. Garfinkel, editors, Security and Usability, pages 47-74. O'Reilly, 2005.
-
(2005)
Security and Usability
, pp. 47-74
-
-
Karat, C.1
Brodie, C.2
Karat, J.3
-
18
-
-
0031510222
-
Bidding on the future: Evidence against normative discounting of delayed rewards
-
K. Kirby. Bidding on the future: Evidence against normative discounting of delayed rewards. In Quarterly Journal of Experimental Psychology, pages 54-70. 126, 1997.
-
(1997)
Quarterly Journal of Experimental Psychology
, vol.126
, pp. 54-70
-
-
Kirby, K.1
-
20
-
-
34547324304
-
Internet geolocation and evasion
-
Technical Report TR-06-05. School of Computer Science, Carleton University, April
-
J. Muir and P. van Oorschot. Internet geolocation and evasion. In Technical Report TR-06-05. School of Computer Science, Carleton University, April 2006.
-
(2006)
-
-
Muir, J.1
van Oorschot, P.2
-
22
-
-
0001775576
-
Heuristic evaluation
-
J. Nielsen and R. L. Mack, editors, Wiley & Sons
-
J. Nielson. Heuristic evaluation. In J. Nielsen and R. L. Mack, editors, Usability Inspection Methods, pages 25-64. Wiley & Sons, 1994.
-
(1994)
Usability Inspection Methods
, pp. 25-64
-
-
Nielson, J.1
-
23
-
-
0034782006
-
An investigation of geographic mapping techniques for internet hosts
-
V. Padmanabhan and L. Subramanian. An investigation of geographic mapping techniques for internet hosts. In Proceedings of SIGCOMM 2001, pages 173-185, 2001.
-
(2001)
Proceedings of SIGCOMM 2001
, pp. 173-185
-
-
Padmanabhan, V.1
Subramanian, L.2
-
24
-
-
0000505675
-
On the failure to eliminate hypotheses in a conceptual task
-
P. Wason. On the failure to eliminate hypotheses in a conceptual task. In Quarterly Journal of Experimental Psychology, pages 129-140. 12, 1960.
-
(1960)
Quarterly Journal of Experimental Psychology
, vol.12
, pp. 129-140
-
-
Wason, P.1
-
25
-
-
0001436725
-
The cognitive walkthrough method: A practitioner's guide
-
J. Nielsen and R. L. Mack, editors, Wiley & Sons
-
C. Wharton, J. Rieman, C. Lewis, and P. Poison. The cognitive walkthrough method: A practitioner's guide. In J. Nielsen and R. L. Mack, editors, Usability Inspection Methods, pages 84-89. Wiley & Sons, 1994.
-
(1994)
Usability Inspection Methods
, pp. 84-89
-
-
Wharton, C.1
Rieman, J.2
Lewis, C.3
Poison, P.4
|