{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:13:22Z","timestamp":1743023602681,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031653070"},{"type":"electronic","value":"9783031653087"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-65308-7_27","type":"book-chapter","created":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T23:02:05Z","timestamp":1724713325000},"page":"386-404","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of\u00a0Privacy Leakage Risks in\u00a0the\u00a0Context of\u00a0Security Threats Associated with\u00a0Digital Device Fingerprinting"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2849-8296","authenticated-orcid":false,"given":"Ivan","family":"Podsevalov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5639-9558","authenticated-orcid":false,"given":"Alexei","family":"Podsevalov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2458-3194","authenticated-orcid":false,"given":"Vladimir","family":"Korkhov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,22]]},"reference":[{"key":"27_CR1","unstructured":"General Data Protection Regulation (2016). https:\/\/gdprinfo.eu\/"},{"key":"27_CR2","unstructured":"Brazilian General Data Protection Law (2019). https:\/\/iapp.org\/media\/pdf\/resource_center\/Brazilian_General_Data_Protection_Law.pdf"},{"key":"27_CR3","unstructured":"The Digital Personal Data Protection Bill (2022). https:\/\/www.meity.gov.in\/writereaddata\/files\/The%20Digital%20Personal%20Data%20Protection%20Bill%2C%202022.pdf"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS \u201903, pp. 202\u2013210 (2003)","DOI":"10.1145\/773153.773173"},{"issue":"5","key":"27_CR5","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-ANONYMITY: a model for protecting privacy. Internat. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Internat. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering (ICDE), p. 24, Atlanta, GA, USA, April 2006","DOI":"10.1109\/ICDE.2006.1"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-Anonymity and l-diversity. In Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering (ICDE), pp. 106\u2013115, Istanbul, T:urkey, April 2007","DOI":"10.1109\/ICDE.2007.367856"},{"key":"27_CR8","unstructured":"Facebook-Cambridge Analytica data scandal (2018). https:\/\/en.wikipedia.org\/wiki\/Facebook%E2%80%93Cambridge_Analytica_data_scandal"},{"key":"27_CR9","unstructured":"How to Protect Yourself From the Giant Marriott Hack (2018). https:\/\/www.wired.com\/story\/marriott-hack-protect-yourself\/"},{"key":"27_CR10","unstructured":"The Top 12 Data Breaches of 2019. https:\/\/www.securitymagazine.com\/articles\/91366-the-top-12-data-breaches-of-2019\/"},{"issue":"3","key":"27_CR11","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1137\/090756090","volume":"40","author":"SP Kasiviswanathan","year":"2011","unstructured":"Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately. SIAM J. Comput. 40(3), 793\u2013826 (2011)","journal-title":"SIAM J. Comput."},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: Proceedings of the 2013 IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS), pp. 429\u2013438, Berkeley, CA, USA, October 2013","DOI":"10.1109\/FOCS.2013.53"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Erlingsson, U., Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1054\u20131067, Scottsdale, AZ, USA, November 2014","DOI":"10.1145\/2660267.2660348"},{"issue":"8","key":"27_CR14","first-page":"1","volume":"1","author":"Differential Privacy Team Apple","year":"2017","unstructured":"Differential Privacy Team Apple: Learning with privacy at scale. Apple Mach. Learn. J. 1(8), 1\u201325 (2017)","journal-title":"Apple Mach. Learn. J."},{"key":"27_CR15","unstructured":"Ding, B., Kulkarni, J., Yekhanin, S.: Collecting telemetry data privately. In: Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS), pp. 3572\u20133581, Long Beach, CA, USA, December 2017"},{"key":"27_CR16","unstructured":"Nguy\u02c6en, T.T., Xiao, X., Yang, Y., Hui, S.C., Shin, H., Shin, J.: Collecting and analyzing data from smart device users with local differential privacy (2016). https:\/\/arxiv.org\/abs\/1606.05053"},{"issue":"309","key":"27_CR17","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."},{"key":"27_CR18","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.entcs.2009.07.085","volume":"249","author":"C Braun","year":"2009","unstructured":"Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative notions of leakage for one-try attacks. Electron. Notes Theor. Comput. Sci. 249, 75\u201391 (2009)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Wang, N., Xiao, X., Yang, Y., et al.: Collecting and analyzing multidimensional data with local differential privacy. In: Proceedings of the 2019 IEEE 35th International Conference on Data Engineering (ICDE), pp. 638\u2013649, Macao, China (2019)","DOI":"10.1109\/ICDE.2019.00063"},{"issue":"9","key":"27_CR20","doi-asserted-by":"crossref","first-page":"2151","DOI":"10.1109\/TIFS.2018.2812146","volume":"13","author":"X Ren","year":"2018","unstructured":"Ren, X., Yu, C.-M., Yu, W., et al.: LoPub: high-dimensional crowdsourced data publication with local differential privacy. IEEE Trans. Inf. Forensics Secur. 13(9), 2151\u20132166 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Cormode, G., Jha, S., Kulkarni, T., Li, N., Srivastava, D., Wang, T.: Privacy at scale: local differential privacy in practice. In: Proceedings of the 2018 International Conference on Management of Data (SIGMOD), pp. 1655\u20131658, Houston, TX, USA, June 2018","DOI":"10.1145\/3183713.3197390"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Li, N., Ye, Q.: Mobile data collection and analysis with local differential privacy. In: Proceedings of the 2019 20th IEEE International Conference on Mobile Data Management (MDM), pp. 4\u20137, Hong Kong, June 2019","DOI":"10.1109\/MDM.2019.00-80"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: SIGMOD (2011)","DOI":"10.1145\/1989323.1989345"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Liu, C., Chakraborty, S., Mittal, P.: Dependence makes you vulnberable: differential privacy under dependent tuples. In: Network and Distributed System Security Symposium (NDSS), pp. 21\u201324 (2016)","DOI":"10.14722\/ndss.2016.23279"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Automata, Languages and Programming, pp. 1\u201312. Springer, Heidelberg (2006). ISBN 978-3-540-35908-1","DOI":"10.1007\/11787006_1"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M.: On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J. Privacy Confidentiality 2(1) (2010)","DOI":"10.29012\/jpc.v2i1.585"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Eckersley, P.: How Unique Is Your Web Browser? Electronic Frontier Foundation (2010)","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"27_CR28","unstructured":"Bessonova, E.: Method of identifying users on the Internet using a component profile. Dissertation for the degree of candidate of technical sciences, ITMO, p. 28 (2012)"},{"key":"27_CR29","unstructured":"Fingerprint Platform. https:\/\/dev.fingerprint.com"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative notions of leakage for one-try attacks. Electronic Notes in Theoretical Computer Science, pp. 75\u201391","DOI":"10.1016\/j.entcs.2009.07.085"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Smith, G.: On the foundations of quantitative information flow. In: Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures, Lecture Notes in Computer Science (2009)","DOI":"10.1007\/978-3-642-00596-1_21"},{"key":"27_CR32","unstructured":"Reny, A.: On measures of entropy and information. In: Proceedings of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability (1960)"},{"key":"27_CR33","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.ic.2013.03.005","volume":"226","author":"B Espinoza","year":"2013","unstructured":"Espinoza, B., Smith, G.: Min-entropy as a resource. Inf. Comput. 226, 57\u201375 (2013)","journal-title":"Inf. Comput."},{"key":"27_CR34","doi-asserted-by":"crossref","unstructured":"Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Smith, G.: Measuring information leakage using generalized gain functions. In: 2012 IEEE 25th Computer Security Foundations Symposium, pp. 265\u2013279 (2012)","DOI":"10.1109\/CSF.2012.26"},{"key":"27_CR35","doi-asserted-by":"crossref","unstructured":"Alvim, M.S., Chatzikokolakis, K., Mciver, A., Morgan, C., Palamidessi, C., Smith, G.: Additive and multiplicative notions of leakage, and their capacities. In: 2014 IEEE 27th Computer Security Foundations Symposium, pp. 308\u2013322 (2014)","DOI":"10.1109\/CSF.2014.29"},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Alvim, M.S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., Smith, G.: The Science of Quantitative Information Flow. Springer (2020)","DOI":"10.1007\/978-3-319-96131-6"},{"key":"27_CR37","doi-asserted-by":"crossref","unstructured":"Podsevalov, I., Podsevalov, A., Korkhov, V.: Differential privacy for statistical data of educational institutions. In: Computational Science and Its Applications - ICCSA 2022 Workshops, pp. 603\u2013615 (2022)","DOI":"10.1007\/978-3-031-10542-5_41"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2024 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-65308-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T23:09:23Z","timestamp":1724713763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-65308-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031653070","9783031653087"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-65308-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"22 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}