Cross-Device Tracking: Measurement and Disclosures
暂无分享,去创建一个
Aaron Alva | Justin Brookman | Phoebe Rouge | Christina Yeung | Justin Brookman | Phoebe Rouge | Aaron Alva | Christina Yeung
[1] Aleecia M. McDonald,et al. The Cost of Reading Privacy Policies , 2009 .
[2] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[3] Chris Jay Hoofnagle,et al. Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.
[4] Avi Goldfarb,et al. Comments on 'A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers' , 2011 .
[5] Balachander Krishnamurthy,et al. Privacy awareness about information leakage: who knows what about me? , 2013, WPES.
[6] Wouter Joosen,et al. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting , 2013, 2013 IEEE Symposium on Security and Privacy.
[7] Arvind Narayanan,et al. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild , 2014, CCS.
[8] Claude Castelluccia,et al. On the uniqueness of Web browsing history patterns , 2014, Ann. des Télécommunications.
[9] Jinyan Zang,et al. Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps , 2015 .
[10] Narseo Vallina-Rodriguez,et al. Haystack: A Multi-Purpose Mobile Vantage Point in User Space , 2015, 1510.01419.
[11] Nathan Good,et al. Web Privacy Census , 2015 .
[12] L. Cranor,et al. Are They Worth Reading? An In-Depth Analysis of Online Trackers’ Privacy Policies , 2015 .
[13] Roberto Díaz-Morales. Cross-Device Tracking: Matching Devices and Cookies , 2015, 2015 IEEE International Conference on Data Mining Workshop (ICDMW).
[14] James Graves. An Exploratory Study of Mobile Application Privacy Policies , 2015 .
[15] Edward W. Felten,et al. Cookies That Give You Away: The Surveillance Implications of Web Tracking , 2015, WWW.
[16] Arvind Narayanan,et al. Online Tracking: A 1-million-site Measurement and Analysis , 2016, CCS.
[17] Arnaud Legout,et al. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic , 2015, MobiSys.
[18] Vitaly Shmatikov,et al. What Mobile Ads Know About Mobile Users , 2016, NDSS.
[19] C. Halberstadt. What We Are. , 2017, JAMA.