{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:14:38Z","timestamp":1752282878031},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2013,9,27]],"date-time":"2013-09-27T00:00:00Z","timestamp":1380240000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s12243-013-0392-5","type":"journal-article","created":{"date-parts":[[2013,9,26]],"date-time":"2013-09-26T07:17:02Z","timestamp":1380179822000},"page":"63-74","source":"Crossref","is-referenced-by-count":11,"title":["On the uniqueness of Web browsing history patterns"],"prefix":"10.1007","volume":"69","author":[{"given":"Lukasz","family":"Olejnik","sequence":"first","affiliation":[]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[]},{"given":"Artur","family":"Janc","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,27]]},"reference":[{"key":"392_CR1","unstructured":"Alexa (2013) Alexa 500. http:\/\/alexa.com . Accessed 10 Feb 2009"},{"key":"392_CR2","unstructured":"Baron LD (2010) Preventing attacks on a user\u2019s history through CSS :visited selectors. http:\/\/dbaron.org\/mozilla\/visited-privacy . Accessed 20 March 2010"},{"key":"392_CR3","doi-asserted-by":"crossref","unstructured":"Bortz A, Boneh D (2007) Exposing private information by timing web applications. In: Proceedings of the 16th international conference on World Wide Web. WWW \u201907, pp 621\u2013628. ACM, New York","DOI":"10.1145\/1242572.1242656"},{"key":"392_CR4","unstructured":"Bugzilla (2002) Bug 147777 - : visited support allows queries into global history. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=147777"},{"key":"392_CR5","doi-asserted-by":"crossref","unstructured":"Eckersley P (2010) How unique is your web browser? In: 10th international symposium on privacy enhancing technologies, pp 1\u201318","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"392_CR6","doi-asserted-by":"crossref","unstructured":"Felten EW, Schneider MA (2000) Timing attacks on web privacy. In: CCS \u201900: proceedings of the 7th ACM conference on computer and communications security, pp 25\u201332. ACM, New York","DOI":"10.1145\/352600.352606"},{"key":"392_CR7","doi-asserted-by":"crossref","unstructured":"Jackson C, Bortz A, Boneh D, Mitchell JC (2006) Protecting browser state from web privacy attacks. In: Proceedings of the 15th international conference on World Wide Web. WWW \u201906, pp 737\u2013744. ACM, New York","DOI":"10.1145\/1135777.1135855"},{"key":"392_CR8","unstructured":"Janc A, Olejnik L (2013). What the internet knows about you. http:\/\/www.wtikay.com\/ . Accessed 20 Sept 2011"},{"key":"392_CR9","doi-asserted-by":"crossref","unstructured":"Janc A, Olejnik L (2010) Web browser history detection as a real-world privacy threat. In: ESORICS, pp 215\u2013231","DOI":"10.1007\/978-3-642-15497-3_14"},{"key":"392_CR10","first-page":"270","volume-title":"Proceedings of CCS 2010","author":"D Jang","year":"2010","unstructured":"Jang D, Jhala R, Lerner S, Shacham H (2010) An empirical study of privacy-violating information flows in JavaScript Web applications. In: Keromytis A, Shmatikov V (eds) Proceedings of CCS 2010. ACM, New York, pp 270\u201383"},{"key":"392_CR11","doi-asserted-by":"crossref","unstructured":"Krishnamurthy B, Wills C (2009) Privacy diffusion on the web: a longitudinal perspective. In: Proceedings of the 18th international conference on World Wide Web. WWW \u201909, pp 541\u2013550. ACM, New York","DOI":"10.1145\/1526709.1526782"},{"key":"392_CR12","unstructured":"Krishnan S, Monrose F (2010) DNS prefetching and its privacy implications: when good things go bad. In: Proceedings of the 3rd USENIX conference on large-scale exploits and emergent threats: botnets, spyware, worms, and more. LEET\u201910, pp 10\u201310. USENIX Association, Berkeley"},{"key":"392_CR13","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/6.259484","volume":"31","author":"B Miller","year":"1994","unstructured":"Miller B (1994) Vital signs of identity. IEEE Spectr 31:22\u201330","journal-title":"IEEE Spectr"},{"key":"392_CR14","doi-asserted-by":"crossref","unstructured":"Moskovitch R, Feher C, Messerman A, Kirschnick N, Mustafic T, Camtepe A, L\u00f6hlein B, Heister U, M\u00f6ller S, Rokach L, Elovici Y (2009) Identity theft, computers and behavioral biometrics. In: Proceedings of the 2009 IEEE international conference on intelligence and security informatics. ISI\u201909, pp 155\u2013160. IEEE, Piscataway","DOI":"10.1109\/ISI.2009.5137288"},{"key":"392_CR15","unstructured":"Mowery K, Bogenreif D, Yilek S, Shacham H (2011) Fingerprinting information in JavaScript implementations. In: Proceedings of W2SP 2011. IEEE Computer Society"},{"key":"392_CR16","doi-asserted-by":"crossref","unstructured":"Olejnik L, Castelluccia C (2013) Towards web-based biometric systems using personal browsing interests. In: 8th international conference on availability, reliability and security. Regensburg, Germany","DOI":"10.1109\/ARES.2013.36"},{"key":"392_CR17","unstructured":"Quantcast (2013) Quantcast. http:\/\/www.quantcast.com\/ . Accessed 10 Feb 2009"},{"key":"392_CR18","unstructured":"Trendmicro (2013) Trend micro site safety center. http:\/\/global.sitesafety.trendmicro.com . Accessed 26 Oct 2011"},{"key":"392_CR19","unstructured":"W3Schools (2013) Browser stats. W3schools online web tutorials [as of 2012]. www.w3schools.com\/browsers\/browsers_stats.asp . Accessed 01 March 2012"},{"key":"392_CR20","doi-asserted-by":"crossref","unstructured":"Weinberg Z, Chen EY, Jayaraman PR, Jackson C (2011) I still know what you visited last summer: leaking browsing history via user interaction and side channel attacks. In: Proceedings of the 2011 IEEE symposium on security and privacy. SP \u201911, pp 147\u2013161. IEEE Computer Society, Washington","DOI":"10.1109\/SP.2011.23"},{"key":"392_CR21","doi-asserted-by":"crossref","unstructured":"Wills CE, Mikhailov M, Shang H (2003) Inferring relative popularity of internet applications by actively querying DNS caches. In: Proceedings of the 3rd ACM SIGCOMM conference on internet measurement. IMC \u201903, pp 78\u201390. ACM, New York","DOI":"10.1145\/948213.948216"},{"key":"392_CR22","doi-asserted-by":"crossref","unstructured":"Wondracek G, Holz T, Kirda E, Kruegel C (2010) A practical attack to de-anonymize social network users. In: IEEE security and privacy. Oakland","DOI":"10.1109\/SP.2010.21"},{"key":"392_CR23","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1504\/IJBM.2008.018665","volume":"1","author":"RV Yampolskiy","year":"2008","unstructured":"Yampolskiy RV, Govindaraju V (2008) Behavioural biometrics: a survey and classification. Int J Biometrics 1:81\u2013113","journal-title":"Int J Biometrics"},{"key":"392_CR24","doi-asserted-by":"crossref","unstructured":"Yen T-F, Huang X, Monrose F, Reiter MK (2009) Browser fingerprinting from coarse traffic summaries: techniques and implications. In: Proceedings of the 6th international conference on detection of intrusions and malware, and vulnerability assessment. DIMVA \u201909, pp 157\u2013175. Springer, Berlin","DOI":"10.1007\/978-3-642-02918-9_10"},{"key":"392_CR25","unstructured":"Yen T-F, Xie Y, Yu F, Yu RP, Abadi M (2012) Host fingerprinting and tracking on the web: privacy and security implications. In: 19th annual network and distributed system security symposium (NDSS) 2012, Internet Society"},{"key":"392_CR26","unstructured":"Zalewski M (2009) Browser security handbook, part 2. http:\/\/code.google.com\/p\/browsersec\/wiki\/Part2 . Accessed 17 Sept 2008"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-013-0392-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-013-0392-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-013-0392-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T20:53:42Z","timestamp":1564088022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-013-0392-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,27]]},"references-count":26,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["392"],"URL":"https:\/\/doi.org\/10.1007\/s12243-013-0392-5","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,27]]}}}