{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:20:47Z","timestamp":1764937247063,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["16\/IA\/4610"],"award-info":[{"award-number":["16\/IA\/4610"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3065243","type":"journal-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T21:17:48Z","timestamp":1615411068000},"page":"41615-41627","source":"Crossref","is-referenced-by-count":16,"title":["Web Browser Privacy: What Do Browsers Say When They Phone Home?"],"prefix":"10.1109","volume":"9","author":[{"given":"Douglas J.","family":"Leith","sequence":"first","affiliation":[]}],"member":"263","reference":[{"year":"2020","journal-title":"Brave P3A Telemetry API","key":"ref39"},{"year":"2020","journal-title":"Firefox Push API","key":"ref38"},{"year":"2020","journal-title":"QUIC a multiplexed stream transport over UDP","key":"ref33"},{"key":"ref32","first-page":"1","article-title":"Why Johnny can&#x2019;t browse in peace: On the uniqueness of Web browsing history pattern","author":"olejnik","year":"2012","journal-title":"Proc Hot Topics Privacy Enhancing Technol"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/SP.2011.23"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/2382196.2382262"},{"year":"2020","journal-title":"Firefox Source Code (V 73 0)","key":"ref37"},{"year":"2020","journal-title":"Implementation for the Usage of Google Safe Browsing APIs (v4)","key":"ref36"},{"year":"2020","journal-title":"Chrome Source Code","key":"ref35"},{"year":"2020","author":"cortesi","journal-title":"mitmproxy A Free and Open Source Interactive HTTPS Proxy","key":"ref34"},{"year":"2020","journal-title":"Firefox Normandy API","key":"ref10"},{"year":"2020","journal-title":"Microsoft Edge Privacy Whitepaper","key":"ref40"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3091478.3091514"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3178876.3186097"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"ref14","first-page":"135","article-title":"Fp-scanner: The privacy implications of browser fingerprint inconsistencies","author":"vastel","year":"2018","journal-title":"Proc 27th USENIX Secur Symp (USENIX Security)"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3308558.3313703"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1515\/popets-2016-0027"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIFS.2016.2551203"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TIFS.2018.2855655"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2810103.2813632"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/1217299.1217302"},{"key":"ref4","first-page":"79","article-title":"An analysis of private browsing modes in modern browsers","author":"aggarwal","year":"2010","journal-title":"Proc 19th USENIX Conf Secur"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1142\/S0218488502001648"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3133956.3136067"},{"year":"2020","journal-title":"Google Safe Browsing API","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/978-3-642-01516-8_26"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.cose.2017.03.006"},{"year":"2020","journal-title":"Chrome Privacy White Paper (January 09 2020)","key":"ref8"},{"year":"2020","journal-title":"Chrome App AutoUpdate API","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2872427.2883034"},{"year":"2020","journal-title":"Firefox Telemetry API","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2976749.2978313"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/2810103.2813708"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/EuroSP.2017.39"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.fsir.2019.100036"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/DSN.2016.39"},{"year":"2020","journal-title":"Apple Privacy Features Suggestions in Search and Safari","key":"ref41"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/SP.2019.00049"},{"key":"ref26","first-page":"159","article-title":"Away from prying eyes: Analyzing usage and understanding of private browsing","author":"habib","year":"2018","journal-title":"Proceedings of Symposium on Usable Privacy and Security (SOUPS)"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TDSC.2019.2937783"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09374407.pdf?arnumber=9374407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:05Z","timestamp":1639770905000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9374407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3065243","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}