Back to Results
First PageMeta Content
System software / Tor / Usability / Cognitive walkthrough / Privacy / Proxy server / Anonymity / HTTP cookie / Degree of anonymity / Software / Internet privacy / Computing


Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems Greg Norcie Jim Blythe
Add to Reading List

Document Date: 2014-04-28 00:10:11


Open Document

File Size: 482,69 KB

Share Result on Facebook

City

Washington / DC / Cambridge / /

Company

Knowledge-Based Systems / BCS Interaction Specialist Group / Privacy Enhancing Technologies / Google / Designing Privacy Enhancing Technologies / Study / Improving Anonymity Networks / IEEE Journal / Anonymity Systems / Microsoft / B. Privacy-Enhancing Technologies / USEC / /

Country

United States / United Kingdom / /

/

Event

Funding / /

Facility

Camp et al. / Indiana University / L. J. Camp / J. Camp / Clemson University / Anonymity Systems Greg Norcie Jim Blythe Kelly Caine L Jean Camp / /

IndustryTerm

anonymous remailer protocol / logical solution / communications security / web browsing / web browser / latency systems / potential solutions / web activity / software package / purpose software / hop proxy software / security technologies / privacy-enhancing technologies / secondgeneration onion router / privacy systems / Internet traffic / on-screen actions using screen capture software / web traffic / online information / project metrics portal / crowded Internet cafe wifi network / wizard-style graphic installer / typical Internet connection / anonymous web browsing / online communication / security software / Internet Explorer / consumer software / /

OperatingSystem

Windows 7 / Microsoft Windows / /

Organization

National Science Foundation / ISBN / Indiana University / USENIX Association / Human Factors and Ergonomics Society / British Computer Society / Electronic Frontier Foundation / Internet Society / Clemson University / IEEE Computer Society / /

Person

Mike Perry / R. Dhamija / Tor Browser Bundle / Tygar / C. Adams / Jim Blythe Kelly Caine / Roger Dingledine / Johnny Can / Sasse / Tom Lowenthal / J. Clark / Bruce Schneier / P. Van Oorschot / Greg Norcie Jim Blythe Kelly / /

Position

first-named author / researcher / author / runner / journalist / graphical controller for Tor / model for protecting privacy / going forward / representative / /

Product

Cohen / Fleiss / /

ProgrammingLanguage

Javascript / /

PublishedMedium

Communications of the ACM / /

Technology

alpha / broadband / secondgeneration onion router / peer-to-peer / privacy-enhancing technologies / screen capture / operating system / html / PDF / layered encryption / security technologies / anonymous remailer protocol / GUI / /

URL

www.schneier.com/blog/archives/2013/09/how / http /

SocialTag