{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:50:38Z","timestamp":1725663038539},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750244","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"471-477","source":"Crossref","is-referenced-by-count":2,"title":["Evaluation of third party tracking on the web"],"prefix":"10.1109","author":[{"given":"Asma","family":"Hamed","sequence":"first","affiliation":[]},{"given":"Hella","family":"Kaffel-Ben Ayed","sequence":"additional","affiliation":[]},{"given":"Mohamed Ali","family":"Kaafar","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Kharraz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2010","author":"mittal","journal-title":"User Privacy and the Evolution of Third-party Tracking Mechanisms on the World Wide Web","key":"3"},{"year":"2010","author":"mouronval","journal-title":"La Gestion des Cookies en Javascript","key":"2"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/1866307.1866339"},{"year":"2012","author":"systems","journal-title":"How to Protect Yourself and Your Family 2009","key":"1"},{"year":"2011","author":"rouse","journal-title":"Betterprivacy","key":"7"},{"key":"6","article-title":"The network advertising initiative failing at consumer protection and at self-regulation","author":"dixon","year":"2007","journal-title":"World Privacy Forum Tech Rep"},{"key":"5","article-title":"A survey of the use of adobe flash local shared objects to respawn http cookies","author":"mcdonald","year":"2011","journal-title":"CMU-CyLab-11-001 Tech Rep"},{"year":"2009","author":"soltani","journal-title":"Flash Cookies and Privacy","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/1526709.1526782"},{"year":"2011","author":"tirtea","journal-title":"Bittersweet Cookies Some Security and Privacy Considerations","key":"8"},{"key":"11","article-title":"Detecting and defending against third-party tracking on the web","author":"roesner","year":"2012","journal-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation"},{"key":"12","article-title":"Data harvesting 20 from the visible to the invisible web","author":"castelluccia","year":"2013","journal-title":"The Twelfth Workshop on the Economics of Information Security"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750244.pdf?arnumber=6750244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:05:57Z","timestamp":1490306757000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750244","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}