Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhancing Technologies (PETs) should not only hide the identity of legitimate users but also provide means by which evidence of malicious activity can be gathered. This paper proposes a forensic investigation technique, which can be embedded in the framework of existing PETs , thereby adding network forensic functionality to the PET. This approach introduces a new dimension to the implementation of Privacy Enhancing Technologies, which enhances their viability in the global network environment
The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet’s infrastr...
Anonymization networks such as Tor provide anonymity indiscriminately to anybody who installs the ap...
The technological threatens to the right of privacy are not only limited to databases. WBSN and perv...
The request of the Internet users enjoying privacy during their e-activities enforces the Internet s...
Privacy-preserving forensic attribution is a new ar-chitectural primitive we propose that allows ind...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
© 2017 The Author(s) The prevalence of the Internet and cloud-based applications, alongside the tech...
The Internet offers users some anonymity; at the network level, an Internet protocol (IP) address is...
Research in Privacy Enhancing Technology has meanwhile a tradition of at least 20 years. One applica...
Internet and mobile communications have had a profound effect on today’s society. New services are c...
The rights of an Internet user acting anonymously conflicts with the rights of a Server victim ident...
Anonymity, Privacy and Privacy Enhincing Technologies (PET) are the terms which are going to be disc...
Clients, administrators, and law enforcement personnel have many privacy concerns when it comes to n...
The amount of personal identifiable information that people distribute over different online service...
The current processes involved in the acquisition of investigative data from third parties, such as ...
The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet’s infrastr...
Anonymization networks such as Tor provide anonymity indiscriminately to anybody who installs the ap...
The technological threatens to the right of privacy are not only limited to databases. WBSN and perv...
The request of the Internet users enjoying privacy during their e-activities enforces the Internet s...
Privacy-preserving forensic attribution is a new ar-chitectural primitive we propose that allows ind...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
© 2017 The Author(s) The prevalence of the Internet and cloud-based applications, alongside the tech...
The Internet offers users some anonymity; at the network level, an Internet protocol (IP) address is...
Research in Privacy Enhancing Technology has meanwhile a tradition of at least 20 years. One applica...
Internet and mobile communications have had a profound effect on today’s society. New services are c...
The rights of an Internet user acting anonymously conflicts with the rights of a Server victim ident...
Anonymity, Privacy and Privacy Enhincing Technologies (PET) are the terms which are going to be disc...
Clients, administrators, and law enforcement personnel have many privacy concerns when it comes to n...
The amount of personal identifiable information that people distribute over different online service...
The current processes involved in the acquisition of investigative data from third parties, such as ...
The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet’s infrastr...
Anonymization networks such as Tor provide anonymity indiscriminately to anybody who installs the ap...
The technological threatens to the right of privacy are not only limited to databases. WBSN and perv...