{"id":"https://openalex.org/W2057119605","doi":"https://doi.org/10.1108/10662240310488933","title":"Revocable anonymous access to the Internet?","display_name":"Revocable anonymous access to the Internet?","publication_year":2003,"publication_date":"2003-09-07","ids":{"openalex":"https://openalex.org/W2057119605","doi":"https://doi.org/10.1108/10662240310488933","mag":"2057119605"},"language":"en","primary_location":{"id":"doi:10.1108/10662240310488933","is_oa":false,"landing_page_url":"https://doi.org/10.1108/10662240310488933","pdf_url":null,"source":{"id":"https://openalex.org/S63576417","display_name":"Internet Research","issn_l":"1066-2243","issn":["1066-2243","2054-5657"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Research","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044954620","display_name":"Joris Claessens","orcid":null},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Joris Claessens","raw_affiliation_strings":["Joris Claessens is at COmputer Security and Industrial Cryptography (COSIC), Katholieke Universiteit Leuven, Belgium","(Joris Claessens is at COmputer Security and Industrial Cryptography (COSIC), Katholieke Universiteit Leuven, Belgium.)"],"affiliations":[{"raw_affiliation_string":"Joris Claessens is at COmputer Security and Industrial Cryptography (COSIC), Katholieke Universiteit Leuven, Belgium","institution_ids":[]},{"raw_affiliation_string":"(Joris Claessens is at COmputer Security and Industrial Cryptography (COSIC), Katholieke Universiteit Leuven, Belgium.)","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070736841","display_name":"Claudia D\u00edaz","orcid":"https://orcid.org/0000-0003-2336-7123"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Claudia D\u00edaz","raw_affiliation_strings":["Claudia D\u00edaz is at COmputer Security and Industrial Cryptography (COSIC), Katholieke Universiteit Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"Claudia D\u00edaz is at COmputer Security and Industrial Cryptography (COSIC), Katholieke Universiteit Leuven, Belgium","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000513566","display_name":"Caroline Goemans","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Caroline Goemans","raw_affiliation_strings":["Caroline Goemans is at the Interdisciplinary Centre for Law and Information Technology (ICRI), Katholieke Universiteit Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"Caroline Goemans is at the Interdisciplinary Centre for Law and Information Technology (ICRI), Katholieke Universiteit Leuven, Belgium","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029732251","display_name":"Jos Dumortier","orcid":"https://orcid.org/0000-0001-6391-5206"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jos Dumortier","raw_affiliation_strings":["Jos Dumortier is at the Interdisciplinary Centre for Law and Information Technology (ICRI), Katholieke Universiteit Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"Jos Dumortier is at the Interdisciplinary Centre for Law and Information Technology (ICRI), Katholieke Universiteit Leuven, Belgium","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039506639","display_name":"Bart Preneel","orcid":"https://orcid.org/0000-0003-2005-9651"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bart Preneel","raw_affiliation_strings":["Bart Preneel is at COmputer Security and Industrial Cryptography (COSIC), Katholieke Universiteit Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"Bart Preneel is at COmputer Security and Industrial Cryptography (COSIC), Katholieke Universiteit Leuven, Belgium","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022355148","display_name":"Joos Vandewalle","orcid":"https://orcid.org/0000-0001-7716-2460"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Joos Vandewalle","raw_affiliation_strings":["Joos Vandewalle is at COmputer Security and Industrial Cryptography (COSIC), Katholieke Universiteit Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"Joos Vandewalle is at COmputer Security and Industrial Cryptography (COSIC), Katholieke Universiteit Leuven, Belgium","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5044954620"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":1.4045,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.85027527,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"13","issue":"4","first_page":"242","last_page":"258"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.9024945497512817},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.8201791644096375},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7336063981056213},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.635593593120575},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.5428833961486816},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5122022032737732},{"id":"https://openalex.org/keywords/internet-access","display_name":"Internet access","score":0.469978004693985},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.4234344959259033},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3643907308578491},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25426816940307617}],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.9024945497512817},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.8201791644096375},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7336063981056213},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.635593593120575},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.5428833961486816},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5122022032737732},{"id":"https://openalex.org/C83849155","wikidata":"https://www.wikidata.org/wiki/Q1472399","display_name":"Internet access","level":3,"score":0.469978004693985},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.4234344959259033},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3643907308578491},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25426816940307617},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C126322002","wikidata":"https://www.wikidata.org/wiki/Q11180","display_name":"Internal medicine","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1108/10662240310488933","is_oa":false,"landing_page_url":"https://doi.org/10.1108/10662240310488933","pdf_url":null,"source":{"id":"https://openalex.org/S63576417","display_name":"Internet Research","issn_l":"1066-2243","issn":["1066-2243","2054-5657"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Research","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.92.3215","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.3215","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cosic.esat.kuleuven.be/publications/article-92.pdf","raw_type":"text"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/71467","is_oa":false,"landing_page_url":"http://gateway.newisiknowledge.com/gateway/Gateway.cgi?GWVersion=2&amp;SrcAuth=CCC&amp;SrcApp=PRODUCT_NAME&amp;SrcURL=WOS_RETURN_URL&amp;CKEY=CLAE0242030013IJ&amp;DestLinkType=FullRecord&amp;DestApp=CCC&amp;SrcDesc=RETURN_ALT_TEXT&amp;SrcAppSID=APP_SID","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Internet Research, vol. 13 (4), Art.No. 4, (242-258)","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320327336","display_name":"Vlaamse regering","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W66051189","https://openalex.org/W1484058845","https://openalex.org/W1517786189","https://openalex.org/W1518154917","https://openalex.org/W1531495657","https://openalex.org/W1532902166","https://openalex.org/W1536924747","https://openalex.org/W1586368357","https://openalex.org/W1590765731","https://openalex.org/W1601001795","https://openalex.org/W1847401883","https://openalex.org/W1953012360","https://openalex.org/W1973264053","https://openalex.org/W1973556911","https://openalex.org/W1978884755","https://openalex.org/W1994989242","https://openalex.org/W2005708967","https://openalex.org/W2040210405","https://openalex.org/W2065554061","https://openalex.org/W2084053344","https://openalex.org/W2087811006","https://openalex.org/W2103647628","https://openalex.org/W2135656098","https://openalex.org/W2141762990","https://openalex.org/W2157186778","https://openalex.org/W2187468798","https://openalex.org/W2269375883","https://openalex.org/W2318126560","https://openalex.org/W2485945664","https://openalex.org/W2493776225","https://openalex.org/W2524060509","https://openalex.org/W2913105718","https://openalex.org/W4285719527","https://openalex.org/W6631038763","https://openalex.org/W6640763826","https://openalex.org/W6677042739"],"related_works":["https://openalex.org/W3200010270","https://openalex.org/W2018307271","https://openalex.org/W2060733767","https://openalex.org/W2092548765","https://openalex.org/W2073613332","https://openalex.org/W1988173948","https://openalex.org/W112798116","https://openalex.org/W2085294052","https://openalex.org/W2403247204","https://openalex.org/W2056760858"],"abstract_inverted_index":{"With":[0],"the":[1,11,13,26,40,43,75,78,91,100,105,111],"worldwide":[2],"growth":[3],"of":[4,18,99,113],"open":[5],"telecommunication":[6],"networks":[7,22],"and":[8,15,35,66,84,97,103],"in":[9],"particular":[10],"Internet,":[12],"privacy":[14],"security":[16],"concerns":[17],"people":[19],"using":[20],"these":[21,63],"have":[23],"increased.":[24],"On":[25,42],"one":[27],"hand,":[28,45],"users":[29],"are":[30,48],"concerned":[31,49],"about":[32,50],"their":[33],"privacy,":[34],"desire":[36],"to":[37,61,74],"anonymously":[38],"access":[39,54,73],"network.":[41],"other":[44],"some":[46,81,95],"organizations":[47],"how":[51],"this":[52],"anonymous":[53,72],"might":[55],"be":[56],"abused.":[57],"This":[58],"paper":[59,79,92],"intends":[60],"bridge":[62],"conflicting":[64],"interests,":[65],"proposes":[67],"a":[68,88],"solution":[69],"for":[70,86,107],"revocable":[71],"Internet.":[76],"Moreover,":[77],"presents":[80],"legal":[82],"background":[83],"motivation":[85],"such":[87],"solution.":[89],"However,":[90],"also":[93],"indicates":[94],"difficulties":[96],"disadvantages":[98],"proposed":[101],"solution,":[102],"suggests":[104],"need":[106],"further":[108],"debate":[109],"on":[110],"issue":[112],"online":[114],"anonymity.":[115]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
