| PDF (1MB) |
- URN to cite this document:
- urn:nbn:de:bvb:355-epub-74524
- DOI to cite this document:
- 10.5283/epub.7452
Alternative links to fulltext:Publisher
Abstract
Research in Privacy Enhancing Technology has meanwhile a tradition of at least 20 years. One application (if not the most significant at the present) of Privacy Enhancing Technology is anonymous Web surfing. While weak protection can be achieved by simple proxy solutions, strong anonymity needs more effort: Systems like JAP and TOR are based on the idea of the "mix network" introduced by David ...

Owner only: item control page
Download Statistics