{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:40Z","timestamp":1773511120628,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,30]]},"DOI":"10.1145\/1180405.1180426","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"154-167","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Doppelganger"],"prefix":"10.1145","author":[{"given":"Umesh","family":"Shankar","sequence":"first","affiliation":[{"name":"UC Berkeley"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chris","family":"Karlof","sequence":"additional","affiliation":[{"name":"UC Berkeley"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_2_1","unstructured":"Add & Edit Cookies. http:\/\/addneditcookies.mozdev.org\/.  Add & Edit Cookies. http:\/\/addneditcookies.mozdev.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 2002 Workshop on Privacy Enhancing Technologies","author":"Alsaid Adil","year":"2002"},{"key":"e_1_3_2_1_4_1","unstructured":"Fahd Arshad. Privacy Fox - A JavaScript-based P3P Agent for Mozilla Firefox. http:\/\/privacyfox.mozdev.org\/PaperFinal.pdf 2004.  Fahd Arshad. Privacy Fox - A JavaScript-based P3P Agent for Mozilla Firefox. http:\/\/privacyfox.mozdev.org\/PaperFinal.pdf 2004."},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX 2003 Annual Technical Conference","author":"Brown Aaron","year":"2003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/948005.948048"},{"key":"e_1_3_2_1_7_1","unstructured":"Electronic Privacy Information Center and Junkbusters. Pretty poor privacy: An assessment of P3P and Internet privacy. http:\/\/www.epic.org\/reports\/prettypoorprivacy.html June 2000.  Electronic Privacy Information Center and Junkbusters. Pretty poor privacy: An assessment of P3P and Internet privacy. http:\/\/www.epic.org\/reports\/prettypoorprivacy.html June 2000."},{"key":"e_1_3_2_1_8_1","unstructured":"Cookie Button. http:\/\/basic.mozdev.org\/cookiebutton\/.  Cookie Button. http:\/\/basic.mozdev.org\/cookiebutton\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Cookie Culler. http:\/\/cookieculler.mozdev.org\/index.html.  Cookie Culler. http:\/\/cookieculler.mozdev.org\/index.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Cookie Toggle. http:\/\/cookietoggle.mozdev.org\/.  Cookie Toggle. http:\/\/cookietoggle.mozdev.org\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_3_2_1_12_1","first-page":"251","volume-title":"10th USENIX Security Symposium","author":"Fu Kevin","year":"2001"},{"key":"e_1_3_2_1_13_1","unstructured":"Jeremy Goecks and Elizabeth D. Mynatt. Social approaches to end-user privacy management. In Lorrie Faith Cranor and Simson Garfinkel editors Security and Usability: Designing Secure Systems That People Can Use chapter 25 pages 523--545. O'Reilly 2005.  Jeremy Goecks and Elizabeth D. Mynatt. Social approaches to end-user privacy management. In Lorrie Faith Cranor and Simson Garfinkel editors Security and Usability: Designing Secure Systems That People Can Use chapter 25 pages 523--545. O'Reilly 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073006"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Proceedings of the Twenty-Third International Conference on Information Systems","author":"Hann Il-Horn","year":"2002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060816"},{"key":"e_1_3_2_1_17_1","unstructured":"LiveHTTPHeaders Firefox extenstion. http:\/\/livehttpheaders.mozdev.org\/.  LiveHTTPHeaders Firefox extenstion. http:\/\/livehttpheaders.mozdev.org\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365034"},{"key":"e_1_3_2_1_19_1","unstructured":"Gavin O'Malley. Jupiter analyst: Nielsen research confirms users delete cookies. http:\/\/publications.mediapost.com\/index.cfm?fuseaction=Articles.san&s=28883&Nid=12855&p=297686.  Gavin O'Malley. Jupiter analyst: Nielsen research confirms users delete cookies. http:\/\/publications.mediapost.com\/index.cfm?fuseaction=Articles.san&s=28883&Nid=12855&p=297686."},{"key":"e_1_3_2_1_20_1","unstructured":"Permit Cookies. http:\/\/gorgias.de\/mfe\/.  Permit Cookies. http:\/\/gorgias.de\/mfe\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Persistent client state: HTTP cookies Preliminary specification. http:\/\/wp.netscape.com\/newsref\/std\/cookie_spec.html.  Persistent client state: HTTP cookies Preliminary specification. http:\/\/wp.netscape.com\/newsref\/std\/cookie_spec.html."},{"key":"e_1_3_2_1_22_1","unstructured":"Kevin Poulsen. Microsoft cookies jump domains. http:\/\/www.securityfocus.com\/news\/83 September 2000.  Kevin Poulsen. Microsoft cookies jump domains. http:\/\/www.securityfocus.com\/news\/83 September 2000."},{"key":"e_1_3_2_1_23_1","unstructured":"Sites use IFrames to bypass cookie prefs. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=158463.  Sites use IFrames to bypass cookie prefs. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=158463."},{"key":"e_1_3_2_1_24_1","unstructured":"The Platform for Privacy Preferences Project (P3P). http:\/\/www.w3.org\/TR\/P3P\/.  The Platform for Privacy Preferences Project (P3P). http:\/\/www.w3.org\/TR\/P3P\/."},{"key":"e_1_3_2_1_25_1","unstructured":"View Cookies. http:\/\/www.bitstorm.org\/extensions\/view-cookies\/.  View Cookies. http:\/\/www.bitstorm.org\/extensions\/view-cookies\/."},{"key":"e_1_3_2_1_26_1","unstructured":"Ka-Ping Yee. Guidelines and strategies for secure interaction design. In Lorrie Faith Cranor and Simson Garfinkel editors Security and Usability: Designing Secure Systems That People Can Use chapter 13 pages 247--273. O'Reilly 2005.  Ka-Ping Yee. Guidelines and strategies for secure interaction design. In Lorrie Faith Cranor and Simson Garfinkel editors Security and Usability: Designing Secure Systems That People Can Use chapter 13 pages 247--273. O'Reilly 2005."}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","location":"Alexandria Virginia USA","acronym":"CCS06","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 13th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1180405.1180426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T09:15:13Z","timestamp":1673082913000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1180405.1180426"}},"subtitle":["Better browser privacy without the bother"],"short-title":[],"issued":{"date-parts":[[2006,10,30]]},"references-count":26,"alternative-id":["10.1145\/1180405.1180426","10.1145\/1180405"],"URL":"https:\/\/doi.org\/10.1145\/1180405.1180426","relation":{},"subject":[],"published":{"date-parts":[[2006,10,30]]},"assertion":[{"value":"2006-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}