Facilitating the Adoption of Tor by Focusing on a Promising Target Group
暂无分享,去创建一个
[1] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[2] Alessandro Acquisti,et al. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study , 2011, WEIS.
[3] Jeremy Clark,et al. Usability of anonymous web browsing: an examination of Tor interfaces and deployability , 2007, SOUPS '07.
[4] J. Billy,et al. Assessment of factors affecting the validity of self-reported health-risk behavior among adolescents: evidence from the scientific literature. , 2003, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[5] Alessandro Acquisti,et al. Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.
[6] Jan Camenisch,et al. An efficient fair payment system , 1996, CCS '96.
[7] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[8] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[9] Rainer Böhme,et al. Pricing strategies in electronic marketplaces with privacy-enhancing technologies , 2007, Wirtsch..
[10] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[11] Stuart E. Schechter,et al. Bootstrapping the Adoption of Internet Security Protocols , 2006, WEIS.
[12] Hannes Federrath. Privacy Enhanced Technologies: Methods - Markets - Misuse , 2005, TrustBus.
[13] Steve G. Sutton. Editors comments: Rediscovering our IS roots , 2004, Int. J. Account. Inf. Syst..
[14] George Danezis,et al. Mix Cascades vs. Peer-to-Peer: Is One Concept Superior? , 2004 .
[15] Nick Mathewson,et al. Anonymity Loves Company: Usability and the Network Effect , 2006, WEIS.
[16] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[17] Sarah Spiekermann. The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services , 2005, Int. J. Technol. Hum. Interact..
[18] Andreas Pfitzmann,et al. Networks Without User Observability: Design Options , 1985, EUROCRYPT.
[19] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[20] Hannes Federrath,et al. Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[21] Blaise Cronin,et al. E-Rogenous Zones: Positioning Pornography in the Digital Economy , 2001, Inf. Soc..
[22] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[23] Cecil Eng Huang Chua,et al. Why Do People Pay for Information Goods? A Study of the Online Porn Industry , 2006, AMCIS.
[24] Fabio D’Orlando. The Market for Pornography in Italy: Empirical Data and Theoretical Considerations , 2008 .
[25] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[26] Dennis F. Galletta,et al. Web Site Delays: How Tolerant are Users? , 2004, J. Assoc. Inf. Syst..
[27] Hermann Ney,et al. Discriminative training for object recognition using image patches , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[28] Alessandro Acquisti,et al. Privacy and Rationality , 2006 .
[29] James E. Pitkow,et al. Summary of WWW characterizations , 1998, World Wide Web.
[30] Andrew M. Odlyzko,et al. The Case Against Micropayments , 2003, Financial Cryptography.
[31] Sarah Spiekermann. Die Konsumenten der Anonymität - Wer nutzt Anonymisierungsdienste? , 2003, Datenschutz und Datensicherheit.
[32] George Danezis,et al. On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?" , 2004, Privacy Enhancing Technologies.
[33] Azy Barak,et al. The Two Faces of the Internet: Introduction to the Special Issue on the Internet and Sexuality , 2000, Cyberpsychology Behav. Soc. Netw..
[34] Ian O. Angell. Ethics and morality: a business opportunity for the amoral? , 2007 .
[35] P. Chatterjee,et al. Modeling the Clickstream: Implications for Web-Based Advertising Efforts , 2003 .
[36] Franz Pichler,et al. Advances in Cryptology — EUROCRYPT’ 85 , 2000, Lecture Notes in Computer Science.
[37] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[38] P. Syverson. The Paradoxical Value of Privacy , 2003 .
[39] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[40] Joan Feigenbaum,et al. Economic Barriers to the Deployment of Existing Privacy Technologies , 2002 .
[41] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[42] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[43] Otto Spaniol,et al. Mobilkommunikation ohne Bewegungsprofile , 1996, Informationstechnik Tech. Inform..