{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:03:12Z","timestamp":1743015792637,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503987"},{"type":"electronic","value":"9783030503994"}],"license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50399-4_16","type":"book-chapter","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:02:37Z","timestamp":1591700557000},"page":"161-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["\u201cGuess Who?\u201d Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication"],"prefix":"10.1007","author":[{"given":"Nampoina","family":"Andriamilanto","sequence":"first","affiliation":[]},{"given":"Tristan","family":"Allard","sequence":"additional","affiliation":[]},{"given":"Ga\u00ebtan Le","family":"Guelvouit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: S&P (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/2699390","volume":"58","author":"J Bonneau","year":"2015","unstructured":"Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: Passwords and the evolution of imperfect authentication. Commun. ACM 58, 78\u201387 (2015)","journal-title":"Commun. ACM"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Eckersley, P.: How unique is your web browser? In: PETS (2010)","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Englehardt, S., Narayanan, A.: Online tracking: a 1-million-site measurement and analysis. In: CCS (2016)","DOI":"10.1145\/2976749.2978313"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"G\u00f3mez-Boix, A., Laperdrix, P., Baudry, B.: Hiding in the crowd: an analysis of the effectiveness of browser fingerprinting at large scale. In: TheWebConf (2018)","DOI":"10.1145\/3178876.3186097"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Laperdrix, P., Avoine, G., Baudry, B., Nikiforakis, N.: Morellian analysis for browsers: making web authentication stronger with canvas fingerprinting. In: DIMVA (2019)","DOI":"10.1007\/978-3-030-22038-9_3"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Laperdrix, P., Rudametkin, W., Baudry, B.: Beauty and the beast: diverting modern web browsers to build unique browser fingerprints. In: S&P (2016)","DOI":"10.1109\/SP.2016.57"},{"key":"16_CR8","first-page":"8","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2003","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, pp. 8\u201311. Springer, London (2003)"},{"key":"16_CR9","unstructured":"Mowery, K., Shacham, H.: Pixel perfect: fingerprinting canvas in HTML5. In: W2SP (2012)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Preuveneers, D., Joosen, W.: SmartAuth: dynamic context fingerprinting for continuous user authentication. In: SAC (2015)","DOI":"10.1145\/2695664.2695908"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Rochet, F., Efthymiadis, K., Koeune, F., Pereira, O.: SWAT: seamless web authentication technology. In: TheWebConf (2019)","DOI":"10.1145\/3308558.3313637"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Spooren, J., Preuveneers, D., Joosen, W.: Mobile device fingerprinting considered harmful for risk-based authentication. In: EuroSec (2015)","DOI":"10.1145\/2751323.2751329"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O., Eranti, V., Moscicki, A., et\u00a0al.: Data breaches, phishing, or malware?: understanding the risks of stolen credentials. In: CCS (2017)","DOI":"10.1145\/3133956.3134067"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Unger, T., Mulazzani, M., Fr\u00fchwirt, D., Huber, M., Schrittwieser, S., Weippl, E.: SHPF: enhancing HTTP(S) session security with browser fingerprinting. In: ARES (2013)","DOI":"10.1109\/ARES.2013.33"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Wang, C., Jan, S.T., Hu, H., Bossart, D., Wang, G.: The next domino to fall: empirical analysis of user passwords across online services. In: CODASPY (2018)","DOI":"10.1145\/3176258.3176332"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50399-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:25:27Z","timestamp":1591701927000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50399-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"ISBN":["9783030503987","9783030503994"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50399-4_16","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"10 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}