Integrating Privacy-Enhancing Technologies into the Internet Infrastructure

The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet’s infrastructure and establish them in the consumer mass market. The technologies in focus include a basis protection at internet service provider level, an improved overlay network-based protection and a concept for privacy protection in the emerging 5G mobile network. A crucial success factor will be the viable adjustment and development of standards, business models and pricing strategies for those new technologies.

[1]  Ian Goldberg,et al.  PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks , 2013, CCS.

[2]  Renato Lo Cigno,et al.  IPsec-Based Anonymous Networking: A Working Implementation , 2009, 2009 IEEE International Conference on Communications.

[3]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[4]  B. Wirtz Business Model Management , 2011 .

[5]  Reza Shokri,et al.  On the Optimal Placement of Mix Zones , 2009, Privacy Enhancing Technologies.

[6]  Hannes Federrath,et al.  EncDNS: A Lightweight Privacy-Preserving Name Resolution Service , 2014, ESORICS.

[7]  Dirk Schneckenberg,et al.  Business Model Innovation – State of the Art and Future Challenges for the Field , 2014 .

[8]  Hans Hedbom Towards an Economic Valuation of Identity Management Enablers , 2013 .

[9]  Yves Pigneur,et al.  Business Model Generation: A handbook for visionaries, game changers and challengers , 2010 .

[10]  Dogan Kesdogan,et al.  A Practical Complexity-Theoretic Analysis of Mix Systems , 2011, ESORICS.

[11]  Kai Rannenberg,et al.  Privacy by Sustainable Identity Management Enablers , 2011, Privacy and Identity Management for Life.

[12]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[13]  Hannes Federrath,et al.  Introducing the gMix Open Source Framework for Mix Implementations , 2012, ESORICS.

[14]  Hannes Federrath,et al.  IPv6 Prefix Alteration: An Opportunity to Improve Online Privacy , 2012, ArXiv.

[15]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[16]  Hannes Federrath Sicherheit mobiler Kommunikation - Schutz in GSM-Netzen, Mobilitätsmanagement und mehrseitige Sicherheit , 1999, DuD-Fachbeiträge.

[17]  Roger Dingledine,et al.  Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it , 2009 .

[18]  Ian Goldberg,et al.  Improving Tor using a TCP-over-DTLS Tunnel , 2009, USENIX Security Symposium.

[19]  Dogan Kesdogan,et al.  Privacy in E-Commerce , 2001 .

[20]  Nora Cuppens-Boulahia,et al.  IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices , 2013, EUNICE.

[21]  Steffen Kunz,et al.  Distributed Performance Measurement and Usability Assessment of the Tor Anonymization Network , 2012, Future Internet.

[22]  Thijs Veugen,et al.  Transparency Enhancing Tools (TETs): An Overview , 2013, 2013 Third Workshop on Socio-Technical Aspects in Security and Trust.

[23]  Gregory Neven,et al.  Economic Valuation of Identity Management Enablers , 2013 .

[24]  Birgit Pfitzmann,et al.  A Toolkit for Managing Enterprise Privacy Policies , 2003, ESORICS.

[25]  G. Sampson Electronic Business , 2008 .