Privacy-Enhancing Technologies for the Internet, II: Five Years Later

Five years ago, "Privacy-enhancing technologies for the Internet" [23] examined the state of the then newly emerging privacy-enhancing technologies. In this survey paper, we look back at the last five years to see what has changed, what has stagnated, what has succeeded, what has failed, and why. We also look at current trends with a view towards the future.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[3]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[4]  Paul Syverson,et al.  Onion Routing for Anonymous and Private Internet Connections , 1999 .

[5]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[6]  Mark Cenite Code and Other Laws of Cyberspace , 2000 .

[7]  David M. Kristol,et al.  HTTP State Management Mechanism , 1997, RFC.

[8]  Nikita Borisov,et al.  Off-the-record communication, or, why not to use PGP , 2004, WPES '04.

[9]  Stefan A. Brands,et al.  Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .

[10]  Bernhard Plattner,et al.  Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.

[11]  Paul F. Syverson,et al.  Hiding Routing Information , 1996, Information Hiding.

[12]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[13]  Roger Dingledine,et al.  The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[14]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[15]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[16]  George Danezis,et al.  Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..

[17]  David A. Wagner,et al.  Privacy-enhancing technologies for the Internet , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.

[18]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[19]  Joan Feigenbaum,et al.  KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.

[20]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[21]  Sarah L. Nesbeitt The Internet Archive Wayback Machine , 2002 .

[22]  Axel Bruns Stuff that matters: Slashdot and the emergence of open news , 2003 .

[23]  Matt Ganis,et al.  SOCKS Protocol Version 5 , 1996, RFC.

[24]  David Burnham Data protection , 1990 .

[25]  David Mazières,et al.  The design, implementation and operation of an email pseudonym server , 1998, CCS '98.

[26]  Aviel D. Rubin,et al.  Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .

[27]  R. Anderson The Eternity Service , 1996 .

[28]  Lorrie Faith Cranor,et al.  Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System , 2000, USENIX Security Symposium.

[29]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .