Evaluation of third party tracking on the web
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Claude Castelluccia,et al. Data Harvesting 2.0: from the Visible to the Invisible Web , 2013, WEIS 2013.
[3] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[4] Bittersweet cookies. Some security and privacy considerations , 2011 .
[5] David Wetherall,et al. Detecting and Defending Against Third-Party Tracking on the Web , 2012, NSDI.
[6] Chris Jay Hoofnagle,et al. Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.
[7] Balachander Krishnamurthy,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .
[8] Li Bai,et al. A strong ramp secret sharing scheme using matrix projection , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[9] Sorin Lerner,et al. An empirical study of privacy-violating information flows in JavaScript web applications , 2010, CCS '10.
[10] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[11] Weiping Wang,et al. New Public-Key Cryptosystem Based on Two-Dimension DLP , 2012, J. Comput..
[12] User Privacy and the Evolution of Third-Party Tracking Mechanisms on the World Wide Web , 2010 .
[13] Lorrie Faith Cranor,et al. A Survey of the Use of Adobe Flash Local Shared Objects to Respawn HTTP Cookies , 2011 .
[14] Ivan Niven. Fermat’s theorem for matrices , 1948 .