{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:41:27Z","timestamp":1751568087638,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030996185"},{"type":"electronic","value":"9783030996192"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99619-2_44","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:19:48Z","timestamp":1648617588000},"page":"459-470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy and\u00a0Security Comparison of\u00a0Web Browsers: A Review"],"prefix":"10.1007","author":[{"given":"R.","family":"Madhusudhan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saurabh V.","family":"Surashe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"44_CR1","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.cose.2017.03.006","volume":"67","author":"N Tsalis","year":"2017","unstructured":"Tsalis, N., Mylonas, A., Nisioti, A., Gritzalis, D., Katos, V.: Exploring the protection of private browsing in desktop browsers. Comput. Secur. 67, 181\u2013197 (2017)","journal-title":"Comput. Secur."},{"key":"44_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.cose.2015.04.009","volume":"52","author":"N Virvilis","year":"2015","unstructured":"Virvilis, N., Mylonas, A., Tsalis, N., Gritzalis, D.: Security busters: web browser security vs. rogue sites. Comput. Secur. 52, 90\u2013105 (2015)","journal-title":"Comput. Secur."},{"issue":"6","key":"44_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSECP.2003.1253567","volume":"1","author":"A Bouguettaya","year":"2003","unstructured":"Bouguettaya, A., Rezgui, A., Eltoweissy, M.: Privacy on the web: facts, challenges, and solutions. IEEE Secur. Priv. 1(6), 40\u201349 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"44_CR4","unstructured":"Mimecast: What is web security? (2021). https:\/\/www.mimecast.com\/content\/web-security\/"},{"key":"44_CR5","unstructured":"Indian Computer Emergency Response Team (2021). https:\/\/www.cert-in.org.in\/s2cMainServlet?pageid=PUBANULREPRT"},{"key":"44_CR6","unstructured":"The Hindu: More than 6.07 lakh cyber security incidents observed till June 2021: Government (2021). https:\/\/www.thehindu.com\/business\/cert-in-observed-more-than-607-lakh.-cyber-security-incidents-till-june-2021-government\/article35726974.ece"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Horsman, G., et al.: A forensic examination of web browser privacy-modes. Forensic Sci. Int. Rep. 1, 100036 (2019)","DOI":"10.1016\/j.fsir.2019.100036"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Korniotakis, J., Papadopoulos, P., Markatos, E.P.: Beyond black and white: combining the benefits of regular and incognito browsing modes. In: ICETE, pp. 192\u2013200 (2020)","DOI":"10.5220\/0009885301920200"},{"key":"44_CR9","unstructured":"Private browsing (2018). https:\/\/en.wikipedia.org\/wiki\/Private_browsing"},{"key":"44_CR10","unstructured":"CodeDocs: Private browsing (2021). https:\/\/codedocs.org\/what-is\/private-browsing"},{"issue":"4","key":"44_CR11","first-page":"40","volume":"24","author":"C Kerschbaumer","year":"2018","unstructured":"Kerschbaumer, C., Crouch, L., Ritter, T., Vyas, T.: Can we build a privacy-preserving web browser we all deserve? XRDS: crossroads. ACM Mag. Stud. 24(4), 40\u201344 (2018)","journal-title":"ACM Mag. Stud."},{"key":"44_CR12","unstructured":"Cookie Script: All you need to know about third-party cookies (2021). https:\/\/cookie-script.com\/all-you-need-to-know-about-third-party-cookies.html"},{"key":"44_CR13","unstructured":"The end of third-party cookies and what to focus on now (2021). https:\/\/www.mightyroar.com\/blog\/third-party-cookies"},{"key":"44_CR14","doi-asserted-by":"publisher","first-page":"41615","DOI":"10.1109\/ACCESS.2021.3065243","volume":"9","author":"DJ Leith","year":"2021","unstructured":"Leith, D.J.: Web browser privacy: what do browsers say when they phone home? IEEE Access 9, 41615\u201341627 (2021)","journal-title":"IEEE Access"},{"key":"44_CR15","first-page":"59","volume":"299","author":"AK Jadoon","year":"2019","unstructured":"Jadoon, A.K., Iqbal, W., Amjad, M.F., Afzal, H., Bangash, Y.A.: Forensic analysis of Tor browser: a case study for privacy and anonymity on the web. Comput. Secur. 299, 59\u201373 (2019)","journal-title":"Comput. Secur."},{"issue":"4","key":"44_CR16","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1504\/IJESDF.2018.095126","volume":"10","author":"RM Gabet","year":"2018","unstructured":"Gabet, R.M., Seigfried-Spellar, K.C., Rogers, M.K.: A comparative forensic analysis of privacy enhanced web browsers and private browsing modes of common web browsers. Int. J. Electron. Secur. Digit. Forensics 10(4), 356\u2013371 (2018)","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"44_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106993","volume":"167","author":"F Cozza","year":"2020","unstructured":"Cozza, F., et al.: Hybrid and lightweight detection of third party tracking: design, implementation, and evaluation. Comput. Netw. 167, 106993 (2020)","journal-title":"Comput. Netw."},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Wu, Q., Liu, Q., Zhang, Y., Wen, G.: TrackerDetector: a system to detect third-party trackers through machine learning. Comput. Netw. 91, 164\u2013173 (2015)","DOI":"10.1016\/j.comnet.2015.08.012"},{"key":"44_CR19","unstructured":"Google safe browsing (2021). https:\/\/en.wikipedia.org\/wiki\/Google_Safe_Browsing"},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Kim, H., Kim, I.S., Kim, K.: AIBFT: artificial intelligence browser forensic toolkit. Forensic Sci. Int. Digit. Invest. 36, 301091 (2021)","DOI":"10.1016\/j.fsidi.2020.301091"},{"key":"44_CR21","unstructured":"StatCounter GlobalStats: Desktop browser market share worldwide (2021). https:\/\/gs.statcounter.com\/browser-market-share\/desktop\/worldwide"},{"key":"44_CR22","unstructured":"Brave (web browser) (2022). https:\/\/en.wikipedia.org\/wiki\/Brave_(web_browser)"},{"key":"44_CR23","unstructured":"Cookie policy - Arad Group (2021). https:\/\/arad.co.il\/app\/uploads\/Cookie-policy.pdf"},{"key":"44_CR24","doi-asserted-by":"crossref","unstructured":"Malandrino, D., Scarano, V.: Privacy leakage on the web: diffusion and countermeasures. Comput. Secur. 57(14), 2833\u20132855 (2013)","DOI":"10.1016\/j.comnet.2013.06.013"},{"key":"44_CR25","doi-asserted-by":"crossref","unstructured":"Mazel, J., Garnier, R., Fukuda, K.: A comparison of web privacy protection techniques. Comput. Commun. 144, 162\u2013174 (2019)","DOI":"10.1016\/j.comcom.2019.04.005"},{"key":"44_CR26","unstructured":"CookiePro: What\u2019s the difference between first and third-party cookies? (2021). https:\/\/www.cookiepro.com\/knowledge\/whats-the-difference-between-first-and.-third-party-cookies\/"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99619-2_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T06:16:01Z","timestamp":1648620961000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99619-2_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030996185","9783030996192"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99619-2_44","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}