Extensive Survey on Anonymity Over Internet and Anonymity Networks - 2016 - 42

Introduction, Internet Anonymity, Anonymity and Pseudonymity, Anonymity on the Internet, Positive and Negative Elements of Anonymity, Cyber Terrorism and Cyber Warfare, The Appeal of Cyber Terrorism for Terrorists, Dark Web, Hacktivism, Deep Web, Safeguarding Personal Data and Transfer Information, Certification, Authentication, Confidentiality, Privacy of Personal Data, Messaging Privacy, Integrity, Firewalls, The Necessity of Firewall Use, Firewall Design Issues, Features of Firewalls, Firewall Weaknesses, Psudonymity vs. Anonymity, Anonymity Systems, Mix Networks, High-Latency Anonymity Systems, Low-Latency Anonymity Systems, Anonymous Web Browsing, Anonymity Protocols, Anonymizer, Crowds, Onion Routing, TOR, TRUSTe, Lucent Personalized Web Assistant, Hordes, Freedom, I2P, Security Threat Model, Eavesdropping, Denial of Service (DoS) Attack, Conclusion, References.