A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2003; you can also visit the original URL.
The file type is
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
This paper presents an original method of providing versatile anonymity for Web users -VAST. It includes an introduction to the current techniques of providing anonymity in WWW system, both popular Third Party Proxy Servers and enhanced systems based on Chaining with Encryption. Limitations of these systems are discussed. In Third Party Proxy Servers -concentration of personal Web activity data; in Chaining with Encryption -low performance and high costs of network realization. Both classes ofdoi:10.1007/0-387-23484-5_7 fatcat:ijrx74gfhna6tn2323qd2q4cbu