Anonymous web browsing

Known as: Anonymous browsing 
Anonymous web browsing refers to utilization of the World Wide Web that hides a user's personally identifiable information from websites visited… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Existing anti-censorship and anonymizing systems like Tor rely on volunteers who run relays. In reality, the most challenging… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Anonymous communication has become a hot research topic in order to meet the increasing demand for web privacy protection… (More)
Is this relevant?
2013
2013
In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain… (More)
  • figure 2
Is this relevant?
2013
2013
Anonymous web browsing is an emerging research topic that allows anyone to surf the web privately and securely. However, research… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2012
2012
The majority of current anonymous systems focus on improving anonymity at the network and website level in order to defend… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2012
2012
Anonymous communication has become a hot research topic in order to meet the increasing demand for web privacy protection… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Anonymous web browsing is an emerging hot topic with many potential applications for privacy and security. However, research on… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Review
2008
Review
2008
Purpose – Anonymity research on high latency, store-and-forward mediums, such as e-mail, have led to comparatively well… (More)
  • figure 1
Is this relevant?
2007
2007
Tor is a popular privacy tool designed to help achieve online anonymity by anonymising web traffic. Employing cognitive… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We describe a class of attacks that can compromise the privacy of users’ Web-browsing histories. The attacks allow a malicious… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?