{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:41Z","timestamp":1750306901207,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,3,18]],"date-time":"2013-03-18T00:00:00Z","timestamp":1363564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,3,18]]},"DOI":"10.1145\/2457317.2457341","type":"proceedings-article","created":{"date-parts":[[2013,3,26]],"date-time":"2013-03-26T12:25:54Z","timestamp":1364300754000},"page":"137-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A theoretical model for obfuscating web navigation trails"],"prefix":"10.1145","author":[{"given":"Fida Kamal","family":"Dankar","sequence":"first","affiliation":[{"name":"CHEO Research Institute, Ottawa, Ontario"}]},{"given":"Khaled","family":"El Emam","sequence":"additional","affiliation":[{"name":"CHEO Research Institute, Ottawa, Ontario"}]}],"member":"320","published-online":{"date-parts":[[2013,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526782"},{"key":"e_1_3_2_1_2_1","unstructured":"B. Krishnamurthy K. Naryshkin and C. Wills \"Privacy leakage vs. protection measures: the growing disconnect \" in Web 2.0 Security and Privacy Workshop 2011.  B. Krishnamurthy K. Naryshkin and C. Wills \"Privacy leakage vs. protection measures: the growing disconnect \" in Web 2.0 Security and Privacy Workshop 2011."},{"volume-title":"Media & Advertising Market Research Handbook. Richard K Miller & Associates","year":"2007","author":"Miller R. K.","key":"e_1_3_2_1_3_1"},{"volume-title":"Diplomica Verlag","year":"2009","author":"Klever A.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880153.1880164"},{"key":"e_1_3_2_1_6_1","unstructured":"J. Rosen \"Who Do Online Advertisers Think You Are? \" The New York Times Nov. 2012.  J. Rosen \"Who Do Online Advertisers Think You Are? \" The New York Times Nov. 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/14684520910985693"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"M. Murugesan and C. Clifton \"Providing privacy through plausibly deniable search \" in Proceedings of the 9th SIAM International Conference on Data Mining (SDM) 2009 pp. 768--779.  M. Murugesan and C. Clifton \"Providing privacy through plausibly deniable search \" in Proceedings of the 9th SIAM International Conference on Data Mining (SDM) 2009 pp. 768--779.","DOI":"10.1137\/1.9781611972795.66"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054471"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v56:2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.77"},{"key":"e_1_3_2_1_12_1","first-page":"417","article-title":"TrackMeNot: Resisting surveillance in web search","author":"Howe D. C.","year":"2009","journal-title":"Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.43"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"R. Dingledine N. Mathewson and P. Syverson \"Tor: The second-generation onion router \" DTIC Document 2004.  R. Dingledine N. Mathewson and P. Syverson \"Tor: The second-generation onion router \" DTIC Document 2004.","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_15_1","unstructured":"S. L. Blond P. Manils C. Abdelberi M. A. D. Kaafar C. Castelluccia A. Legout and W. Dabbous \"One bad apple spoils the bunch: Exploiting P2P applications to trace and profile tor users \" arXiv preprint arXiv:1103.1518 2011.   S. L. Blond P. Manils C. Abdelberi M. A. D. Kaafar C. Castelluccia A. Legout and W. Dabbous \"One bad apple spoils the bunch: Exploiting P2P applications to trace and profile tor users \" arXiv preprint arXiv:1103.1518 2011."},{"key":"e_1_3_2_1_16_1","unstructured":"Federal Trade Commission \"Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers \" FTC Privacy Report Mar. 2012.  Federal Trade Commission \"Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers \" FTC Privacy Report Mar. 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/383694.383707"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13470-8_31"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.36"},{"key":"e_1_3_2_1_20_1","first-page":"19","article-title":"On the privacy of web search based on query obfuscation: a case study of TrackMeNot,\" in Proceedings of the 10th international conference on Privacy enhancing technologies, Berlin","author":"Peddinti S. T.","year":"2010","journal-title":"Heidelberg"},{"key":"e_1_3_2_1_21_1","first-page":"349","volume-title":"ABIS","author":"Hartmann M.","year":"2007"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.170"},{"issue":"1","key":"e_1_3_2_1_23_1","first-page":"18","article-title":"A survey of Web caching and prefetching","volume":"3","author":"Ali W.","year":"2011","journal-title":"Int. J. Advance. Soft Comput. Appl"},{"volume-title":"Department of Computer Science","year":"1998","author":"Palpanas T.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2008.19"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1410012.1410014"},{"key":"e_1_3_2_1_27_1","unstructured":"Q. Liu \"Web latency reduction with prefetching \" THE UNIVERSITY OF WESTERN ONTARIO 2010.   Q. Liu \"Web latency reduction with prefetching \" THE UNIVERSITY OF WESTERN ONTARIO 2010."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJKWI.2009.027925"}],"event":{"name":"EDBT\/ICDT '13: Joint 2013 EDBT\/ICDT Conferences","acronym":"EDBT\/ICDT '13","location":"Genoa Italy"},"container-title":["Proceedings of the Joint EDBT\/ICDT 2013 Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2457317.2457341","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2457317.2457341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:12Z","timestamp":1750234752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2457317.2457341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,18]]},"references-count":28,"alternative-id":["10.1145\/2457317.2457341","10.1145\/2457317"],"URL":"https:\/\/doi.org\/10.1145\/2457317.2457341","relation":{},"subject":[],"published":{"date-parts":[[2013,3,18]]},"assertion":[{"value":"2013-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}