{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:25:35Z","timestamp":1771457135553,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319115986","type":"print"},{"value":"9783319115993","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11599-3_11","type":"book-chapter","created":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T13:15:19Z","timestamp":1412601319000},"page":"181-196","source":"Crossref","is-referenced-by-count":8,"title":["Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach"],"prefix":"10.1007","author":[{"given":"Fr\u00e9d\u00e9ric","family":"Besson","sequence":"first","affiliation":[]},{"given":"Nataliia","family":"Bielova","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Jensen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Acar, G., Ju\u00e1rez, M., Nikiforakis, N., D\u00edaz, C., G\u00fcrses, S.F., Piessens, F., Preneel, B.: FPDetective: dusting the web for fingerprinters. In: CCS 2013, pp. 1129\u20131140. ACM (2013)","DOI":"10.1145\/2508859.2516674"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Besson, F., Bielova, N., Jensen, T.: Hybrid information flow monitoring against web tracking. In: CSF 2013, pp. 240\u2013254. IEEE (2013)","DOI":"10.1109\/CSF.2013.23"},{"key":"11_CR3","unstructured":"Besson, F., Bielova, N., Jensen, T.: Enforcing browser anonymity with quantitative information flow. Technical Report 8532, Inria (2014)"},{"key":"11_CR4","unstructured":"Bielova, N., Palladino, P.: Stopfingerprinting (2013), \n                        https:\/\/stopfingerprinting.inria.fr\/"},{"key":"11_CR5","unstructured":"Boda, K.: Firegloves, \n                        http:\/\/fingerprint.pet-portal.eu\/?menu=6"},{"issue":"5","key":"11_CR6","doi-asserted-by":"crossref","first-page":"655","DOI":"10.3233\/JCS-2009-0353","volume":"17","author":"M.R. Clarkson","year":"2009","unstructured":"Clarkson, M.R., Myers, A.C., Schneider, F.B.: Quantifying information flow with beliefs. Journal of Computer Security\u00a017(5), 655\u2013701 (2009)","journal-title":"Journal of Computer Security"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley (2006)","DOI":"10.1002\/047174882X"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"11_CR10","unstructured":"Eckersley, P.: The Panopticlick project, \n                        https:\/\/panopticlick.eff.org"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.ic.2013.03.005","volume":"226","author":"B. Espinoza","year":"2013","unstructured":"Espinoza, B., Smith, G.: Min-entropy as a resource. Inf. Comp.\u00a0226, 57\u201375 (2013)","journal-title":"Inf. Comp."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Gretz, F., Katoen, J.-P., McIver, A.: Operational versus weakest precondition semantics for the probabilistic guarded command language. In: QEST, pp. 168\u2013177. IEEE (2012)","DOI":"10.1109\/QEST.2012.21"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.tcs.2014.04.022","volume":"538","author":"V. Klebanov","year":"2014","unstructured":"Klebanov, V.: Precise quantitative information flow analysis - a symbolic approach. Theor. Comput. Sci.\u00a0538, 124\u2013139 (2014)","journal-title":"Theor. Comput. Sci."},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-40196-1_16","volume-title":"Quantitative Evaluation of Systems","author":"V. Klebanov","year":"2013","unstructured":"Klebanov, V., Manthey, N., Muise, C.: SAT-based analysis and quantification of information flow in programs. In: Joshi, K., Siegle, M., Stoelinga, M., D\u2019Argenio, P.R. (eds.) QEST 2013. LNCS, vol.\u00a08054, pp. 177\u2013192. Springer, Heidelberg (2013)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Rybalchenko, A.: Approximation and randomization for quantitative information-flow analysis. In: CSF 2010, pp. 3\u201314. IEEE (2010)","DOI":"10.1109\/CSF.2010.8"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Mardziel, P., Magill, S., Hicks, M., Srivatsa, M.: Dynamic Enforcement of Knowledge-based Security Policies. In: CSF 2011, pp. 114\u2013128. IEEE (2011)","DOI":"10.1109\/CSF.2011.15"},{"issue":"4","key":"11_CR17","doi-asserted-by":"crossref","first-page":"463","DOI":"10.3233\/JCS-130469","volume":"21","author":"P. Mardziel","year":"2013","unstructured":"Mardziel, P., Magill, S., Hicks, M., Srivatsa, M.: Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation. Journal of Computer Security\u00a021(4), 463\u2013532 (2013)","journal-title":"Journal of Computer Security"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 541\u2013555 (2013)","DOI":"10.1109\/SP.2013.43"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Hay, M., Miklau, G., Suciu, D.: Relationship privacy: Output perturbation for queries with joins. In: PODS 2009, pp. 107\u2013116. ACM (2009)","DOI":"10.1145\/1559795.1559812"},{"key":"11_CR20","unstructured":"Schrijver, A.: Theory of Linear and Integer Programming. Wiley (1998)"},{"issue":"5","key":"11_CR21","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.\u00a010(5), 571\u2013588 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"issue":"1","key":"11_CR22","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s00453-006-1231-0","volume":"48","author":"S. Verdoolaege","year":"2007","unstructured":"Verdoolaege, S., Seghir, R., Beyls, K., Loechner, V., Bruynooghe, M.: Counting integer points in parametric polytopes using barvinok\u2019s rational functions. Algorithmica\u00a048(1), 37\u201366 (2007)","journal-title":"Algorithmica"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11599-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T02:52:23Z","timestamp":1675997543000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11599-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115986","9783319115993"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11599-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}