Behavioural Tracking on the Internet: A Technical Perspective
暂无分享,去创建一个
[1] Catherine Dwyer,et al. Behavioral Targeting: A Case Study of Consumer Tracking on Levis.com , 2009, AMCIS.
[2] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2009, CCRV.
[3] Gerald Friedland,et al. Cybercasing the Joint: On the Privacy Implications of Geo-Tagging , 2010, HotSec.
[4] Bruce Schneier,et al. Architecture of Privacy , 2009, IEEE Security & Privacy Magazine.
[5] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[6] Gregory J. Conti,et al. An honest man has nothing to fear: user perceptions on web-based information disclosure , 2007, SOUPS '07.
[7] Mireille Hildebrandt. Profiling: From data to knowledge , 2006, Datenschutz und Datensicherheit - DuD.
[8] Massimo Barbaro,et al. A Face Is Exposed for AOL Searcher No , 2006 .
[9] Evelyne Beatrix Cleff,et al. Privacy Issues in Mobile Advertising , 2007 .
[10] Ian Goldberg,et al. Louis, Lester and Pierre: Three Protocols for Location Privacy , 2007, Privacy Enhancing Technologies.
[11] Balachander Krishnamurthy,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .
[12] Reality Mining , 2014, Encyclopedia of Social Network Analysis and Mining.
[13] Chris Jay Hoofnagle,et al. Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.
[14] Ben Laurie,et al. Under)mining Privacy in Social Networks , 2008 .
[15] Emiliano De Cristofaro,et al. Private Information Disclosure from Web Searches , 2010, Privacy Enhancing Technologies.
[16] Balachander Krishnamurthy,et al. Characterizing privacy in online social networks , 2008, WOSN '08.
[17] Privacy, Accountability and Trust – Challenges and Opportunities , 2011 .
[18] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[19] Serge Gutwirth,et al. Data Protection in a Profiled World , 2010, Data Protection in a Profiled World.
[20] Lise Getoor,et al. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.
[21] Katja Hose,et al. Partout: a distributed engine for efficient RDF processing , 2012, WWW.
[22] John Krumm. Ubiquitous Advertising: The Killer Application for the 21st Century , 2011, IEEE Pervasive Computing.
[23] Dan Boneh,et al. An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.
[24] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[25] Mirco Musolesi,et al. Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.
[26] Emiliano Miluzzo,et al. People-centric urban sensing , 2006, WICON '06.
[27] Daniel Le Métayer. Privacy by Design: A Matter of Choice , 2010, Data Protection in a Profiled World.
[28] Evgeniy Gabrilovich,et al. Introduction to Computational Advertising , 2008, ACL.
[29] Balachander Krishnamurthy,et al. Privacy Leakage in Mobile Online Social Networks , 2010, WOSN.
[30] Greg Conti. Googling Security: How Much Does Google Know About You? , 2008 .