{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:49:43Z","timestamp":1776084583481,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030314996","type":"print"},{"value":"9783030315009","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31500-9_6","type":"book-chapter","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T23:26:53Z","timestamp":1568935613000},"page":"80-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["On Privacy Risks of Public WiFi Captive Portals"],"prefix":"10.1007","author":[{"given":"Suzan","family":"Ali","sequence":"first","affiliation":[]},{"given":"Tousif","family":"Osman","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,20]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Acar, G., et al.: FPDetective: dusting the web for fingerprinters. In: ACM CCS 2013. Berlin, Germany, November 2013","DOI":"10.1145\/2508859.2516674"},{"key":"6_CR2","unstructured":"Adobe.com: Adobe experiance cloud: Device Co-op privacy control. https:\/\/cross-device-privacy.adobe.com"},{"issue":"4","key":"6_CR3","doi-asserted-by":"publisher","first-page":"52:1","DOI":"10.1145\/3176246","volume":"18","author":"R Binns","year":"2018","unstructured":"Binns, R., Zhao, J., Kleek, M.V., Shadbolt, N.: Measuring third-party tracker power across web and mobile. ACM Trans. Internet Technol. 18(4), 52:1\u201352:22 (2018)","journal-title":"ACM Trans. Internet Technol."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Brookman, J., Rouge, P., Alva, A., Yeung, C.: Cross-device tracking: measurement and disclosures. In: Proceedings on Privacy Enhancing Technologies (PETS). Minneapolis, MN, USA, July 2017","DOI":"10.1515\/popets-2017-0020"},{"issue":"8","key":"6_CR5","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/JPROC.2016.2637878","volume":"105","author":"T Bujlow","year":"2017","unstructured":"Bujlow, T., Carela-Espa\u00f1ol, V., Sole-Pareta, J., Barlet-Ros, P.: A survey on web tracking: mechanisms, implications, and defenses. Proc. IEEE 105(8), 1476\u20131510 (2017)","journal-title":"Proc. IEEE"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, N., Wang, X.O., Cheng, W., Mohapatra, P., Seneviratne, A.: Characterizing privacy leakage of public WiFi networks for users on travel. In: 2013 Proceedings IEEE INFOCOM. Turin, Italy, April 2013","DOI":"10.1109\/INFCOM.2013.6567086"},{"key":"6_CR7","first-page":"1","volume-title":"Privacy Enhancing Technologies","author":"Peter Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: International Symposium on Privacy Enhancing Technologies Symposium (2010)"},{"key":"6_CR8","unstructured":"Elifantiev, O.: NodeJS module to compare two DOM-trees. https:\/\/github.com\/Olegas\/dom-compare"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Englehardt, S., Narayanan, A.: Online tracking: A 1-million-site measurement and analysis. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vienna, Austria, October 2016","DOI":"10.1145\/2976749.2978313"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"G\u00f3mez-Boix, A., Laperdrix, P., Baudry, B.: Hiding in the crowd: an analysis of the effectiveness of browser fingerprinting at large scale. In: TheWebConf (WWW 2018). Lyon, France, April 2018","DOI":"10.1145\/3178876.3186097"},{"key":"6_CR11","unstructured":"Google: HTTPS encryption on the web. https:\/\/transparencyreport.google.com\/https\/overview?hl=en"},{"key":"6_CR12","unstructured":"Klafter, R.: Don\u2019t FingerPrint Me. https:\/\/github.com\/freethenation\/DFPM"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Klein, A., Pinkas, B.: DNS cache-based user tracking. In: Network and Distributed System Security Symposium (NDSS 2019). San Diego, CA, USA, February 2019","DOI":"10.14722\/ndss.2019.23186"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Laperdrix, P., Rudametkin, W., Baudry, B.: Beauty and the beast: diverting modern web browsers to build unique browser fingerprints. In: IEEE Symposium on Security and Privacy (SP). San Jose, CA, USA (2016)","DOI":"10.1109\/SP.2016.57"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Le Pochat, V., Van Goethem, T., Tajalizadehkhoob, S., Korczy\u0144ski, M., Joosen, W.: Tranco: a research-oriented top sites ranking hardened against manipulation. In: NDSS 2019. San Diego, CA, USA, February 2019","DOI":"10.14722\/ndss.2019.23386"},{"key":"6_CR16","unstructured":"Medium.com: My hotel WiFi injects ads. does yours?, news article (25 March 2016). https:\/\/medium.com\/@nicklum\/my-hotel-WiFi-injects-ads-does-yours-6356710fa180"},{"key":"6_CR17","unstructured":"Mowery, K., Shacham, H.: Pixel perfect: fingerprinting canvas in HTML5. In: Proceedings of W2SP, pp. 1\u201312 (2012)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In: 2013 IEEE Symposium on Security and Privacy. Berkeley, CA, USA, May 2013","DOI":"10.1109\/SP.2013.43"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-319-29883-2_18","volume-title":"Data Privacy Management, and Security Assurance","author":"\u0141 Olejnik","year":"2016","unstructured":"Olejnik, \u0141., Acar, G., Castelluccia, C., Diaz, C.: The leaking battery. In: Garcia-Alfaro, J., Navarro-Arribas, G., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/QASA -2015. LNCS, vol. 9481, pp. 254\u2013263. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29883-2_18"},{"key":"6_CR20","unstructured":"PCWorld.com: Comcast\u2019s open WiFi hotspots inject ads into your browser, news article, 09 September 2014. https:\/\/www.pcworld.com\/article\/2604422\/comcasts-open-wi-fi-hotspots-inject-ads-into-your-browser.html"},{"key":"6_CR21","unstructured":"Reis, C., Gribble, S.D., Kohno, T., Weaver, N.C.: Detecting in-flight page changes with web tripwires. In: NSDI 2008, San Francisco, CA, USA (2008)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Sanchez-Rola, I., Santos, I., Balzarotti, D.: Clock around the clock: time-based device fingerprinting. In: ACM CCS 2018, Toronto, Canada, October 2018","DOI":"10.1145\/3243734.3243796"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Sombatruang, N., Kadobayashi, Y., Sasse, M.A., Baddeley, M., Miyamoto, D.: The continued risks of unsecured public WiFi and why users keep using it: evidence from Japan. In: Privacy, Security and Trust (PST 2018), Belfast, UK, August 2018","DOI":"10.1109\/PST.2018.8514208"},{"key":"6_CR24","unstructured":"Symantec: Norton WiFi risk report: Summary of global results, technical report, 5 May 2017. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/2017-norton-wifi-risk-report-global-results-summary-en.pdf"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Tsirantonakis, G., Ilia, P., Ioannidis, S., Athanasopoulos, E., Polychronakis, M.: A large-scale analysis of content modification by open HTTP proxies. In: Network and Distributed System Security Symposium (NDSS 2018) (2018)","DOI":"10.14722\/ndss.2018.23244"},{"key":"6_CR26","unstructured":"Valve: Fingerprintjs by Valve. https:\/\/valve.github.io\/fingerprintjs\/"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31500-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:02:28Z","timestamp":1726790548000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-31500-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030314996","9783030315009"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31500-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Data Privacy Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dpm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2019.uni.lu\/workshops\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}