{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:40:01Z","timestamp":1770540001277,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266460","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T17:59:13Z","timestamp":1443117553000},"page":"1-5","source":"Crossref","is-referenced-by-count":30,"title":["A classification of web browser fingerprinting techniques"],"prefix":"10.1109","author":[{"given":"Randika","family":"Upathilake","sequence":"first","affiliation":[]},{"given":"Yingkun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ashraf","family":"Matrawy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Pixel perfect: Fingerprinting canvas in HTML 5","author":"mowery","year":"2012","journal-title":"Proceedings of Web 2 0 Security & Privacy"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"ref12","year":"0"},{"key":"ref13","article-title":"Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting","author":"mulazzani","year":"2013","journal-title":"Proceedings of Web 2 0 Security & Privacy"},{"key":"ref14","author":"bojinov","year":"0","journal-title":"(2014 August) Mobile Device Identification via Sensor Fingerprinting"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.48"},{"key":"ref16","year":"0","journal-title":"Adblock Plus"},{"key":"ref17","year":"0","journal-title":"Ghostery"},{"key":"ref18","year":"0","journal-title":"NoScript"},{"key":"ref19","article-title":"Host Fingerprinting and Tracking on the Web: Privacy and Security Implications","author":"yen","year":"2012","journal-title":"Proceddings of the 19th Annual Network and Distributed System Security Symposium Internet Society"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1145\/2508859.2516674","article-title":"FPDetective: Dusting the Web for Fingerprinters","author":"acar","year":"2013","journal-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29615-4_4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.160"},{"key":"ref5","article-title":"How Unique Is Your Browser?","author":"eckersley","year":"0","journal-title":"10th Privacy Enhancing Technologies Symposium"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"ref7","article-title":"Fingerprinting Information in JavaScript Implementations","author":"mowery","year":"0","journal-title":"Proceedings of Web 2 0 Security & Privacy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/14684520010330346"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","location":"Paris, France","start":{"date-parts":[[2015,7,27]]},"end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266460.pdf?arnumber=7266460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:09:29Z","timestamp":1498234169000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266460\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266460","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}