Low Latency Anonymous Communication – How Long Are Users Willing to Wait?

  • Stefan Köpsell
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3995)


One of the heavily discussed design questions for low latency anonymity systems is: “How much additional anonymity will the system provide by adding a certain amount of delay?” But current research on this topic ignores an important aspect of this question – the influence of the delay on the number of users and by this means on the anonymity provided. This paper shows some first experimental results in this area. Hopefully, it supports better design decisions for low latency anonymity systems.


Internet Service Provider Additional Delay Anonymous Communication Anonymity Service Anonymity System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [BeFK00]
    Berthold, O., Federrath, H., Köpsell, S.: Web MIXes: A System for Anonymous and Unobservable Internet Access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 115–129. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. [CCMT90]
    Cleveland, R.B., Cleveland, W.S., McRae, J.E., Terpenning, I.: STL: A Sesonal-Trend Decomposition Procedure Based on Loess. Journal of Official Statistics 6(1), 3–73 (1990)Google Scholar
  3. [Chau81]
    Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)CrossRefGoogle Scholar
  4. [DaDM03]
    Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: Proc. of the 2003 IEEE Symposium on Security and Privacy (May 2003)Google Scholar
  5. [DiMS04]
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proc. of the 13th USENIX Security Symposium (August 2004)Google Scholar
  6. [Ding05]
    Dingledine, R.: Research question for Tor. Dagstuhl Seminar 05411: Anonymous Communication and its Applications, Schloss Dagstuhl, Germany (October 2005),
  7. [GHCP04]
    Galletta, D.F., Henry, R., McCoy, S., Polak, P.: Web Site Delays: How Tolerant are Users? Journal of the Association for Information Systems 5(1), 1–28 (2004)Google Scholar
  8. [HoDi00]
    Hoxmeier, J.A., DiCesare, C.: System response time and user satisfaction: An experimental study of browser-based applications. In: Proc. of the Association of Information Systems Americas Conference, Long Beach California (August 2000), pp. 140–145 (2000) Google Scholar
  9. [IBM03]
    International Business Maschines: Final Testing (2003),
  10. [KeEB98]
    Kesdogan, D., Egner, J., Büschkes, R.: Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 83. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  11. [MaxMind05]
    Web-Site of MaxMind LLC (2005),
  12. [Mill68]
    Miller, R.B.: Response time in man-computer conversational transaction. In: Proc. of AFIPS Fall Joint Computer conference, vol. 33, pp. 267–277 (1968)Google Scholar
  13. [MöCo00]
    Möller, U., Cottrell, L.: Mixmaster Protocol – Version 2. Unfinished draft (January 2000),
  14. [Nah04]
    Nah, F.: A study on tolerable waiting time: how long are Web users willing to wait? Behaviour & Information Technology, Special Issue on HCI in MIS 23 (2004)Google Scholar
  15. [Niel93]
    Nielsen, J.: Response times: the three important limits. In: Usability Engineering, ch. 5. Academic Press, London (1993)Google Scholar
  16. [Niel95]
    Nielsen, J.: Guidelines for multimedia on the web. Jakob Nielsen’s Alertbox for December 1995 (1995),
  17. [Niel96]
    Nielsen, J.: Top ten mistakes in Web design. Jakob Nielsen’s Alertbox for May 1996 (1996),
  18. [Niel97]
    Nielsen, J.: The need for speed. Jakob Nielsen’s Alertbox for March 1997 (1997),
  19. [PfHa05]
    Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology (November 2005),
  20. [PfPW91]
    Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-mixes: Untraceable communication with very small bandwidth overhead. In: Proc. of the GI/ITG Conference on Communication in Distributed Systems, pp. 451–463 (February 1991)Google Scholar
  21. [R]
    R Development Core Team: R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. (2005), ISBN 3-900051-07-0
  22. [RaBP98]
    Ramsay, J., Barbesi, A., Preece, J.: A psychological investigation of long retrieval times on the world wide web. Interacting with Computers 10(1), 77–86 (1998)CrossRefGoogle Scholar
  23. [RoES03]
    Rose, G.M., Evaristo, R., Straub, D.W.: Culture and Consumer Responses to Web download Time: A Four-Continent Study of Mono and Polychronism. IEEE Transactions on Engineering Management 50(1), 31–44 (2003)CrossRefGoogle Scholar
  24. [RoSt01]
    Rose, G.M., Straub, D.W.: The effect of download time on consumer attitude toward the e-service retailer. e-Service Journal 1, 55–76 (2001)CrossRefGoogle Scholar
  25. [RSF]
    Reporters without borders: Saudi Arabia - 2005 annual report (2005),
  26. [Selv99]
    Selvidge, P.: How long is too long for a website to load? Usability News 1(2) (1999),
  27. [Shne84]
    Shneidermann, B.: Response time and display rate in human performance with computers. Computing Surveys 16, 265–285 (1984)CrossRefGoogle Scholar
  28. [Zona]
    Zona Research Inc.: The Economic Impacts of Unacceptable Web-Site Download Speeds (April 1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Stefan Köpsell
    • 1
  1. 1.Dresden University of TechnologyGermany

Personalised recommendations