{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:33:14Z","timestamp":1769722394895,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3274694.3274708","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T13:07:01Z","timestamp":1543928821000},"page":"289-299","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Tracking Users across the Web via TLS Session Resumption"],"prefix":"10.1145","author":[{"given":"Erik","family":"Sy","sequence":"first","affiliation":[{"name":"University of Hamburg"}]},{"given":"Christian","family":"Burkert","sequence":"additional","affiliation":[{"name":"University of Hamburg"}]},{"given":"Hannes","family":"Federrath","sequence":"additional","affiliation":[{"name":"University of Hamburg"}]},{"given":"Mathias","family":"Fischer","sequence":"additional","affiliation":[{"name":"University of Hamburg"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security Symposium","volume":"8","author":"Durumeric Z.","unstructured":"Z. Durumeric , E. Wustrow , and J A. Halderman . 2013. ZMap: Fast Internet-wide Scanning and Its Security Applications .. In USENIX Security Symposium , Vol. 8 . 47--53. Z. Durumeric, E. Wustrow, and J A. Halderman. 2013. ZMap: Fast Internet-wide Scanning and Its Security Applications.. In USENIX Security Symposium, Vol. 8. 47--53."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_3_1","unstructured":"P. Eronen H. Tschofenig H. Zhou and J. A. Salowey. 2008. Transport Layer Security (TLS) Session Resumption without Server-Side State. RFC 5077. (Jan. 2008).  P. Eronen H. Tschofenig H. Zhou and J. A. Salowey. 2008. Transport Layer Security (TLS) Session Resumption without Server-Side State. RFC 5077. (Jan. 2008)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.03.012"},{"key":"e_1_3_2_1_6_1","volume-title":"Security and Trust (PST), 2016 14th Annual Conference on. IEEE, 596--599","author":"Herrmann D.","unstructured":"D. Herrmann , M. Kirchler , J. Lindemann , and M. Kloft . 2016. Behavior-based tracking of Internet users with semi-supervised learning. In Privacy , Security and Trust (PST), 2016 14th Annual Conference on. IEEE, 596--599 . D. Herrmann, M. Kirchler, J. Lindemann, and M. Kloft. 2016. Behavior-based tracking of Internet users with semi-supervised learning. In Privacy, Security and Trust (PST), 2016 14th Annual Conference on. IEEE, 596--599."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0030-7"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"Apple Inc.","year":"2018","unstructured":"Apple Inc. 2018 . App Store Review Guidelines. (2018) . Retrieved May 15, 2018 from https:\/\/developer.apple.com\/app-store\/review\/guidelines\/ Apple Inc. 2018. App Store Review Guidelines. (2018). Retrieved May 15, 2018 from https:\/\/developer.apple.com\/app-store\/review\/guidelines\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Alexa Internet Inc.","year":"2018","unstructured":"Alexa Internet Inc. 2018 . Alexa Top 1,000,000 Sites. (2018) . Retrieved March 15, 2018 from http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip Alexa Internet Inc. 2018. Alexa Top 1,000,000 Sites. (2018). Retrieved March 15, 2018 from http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","author":"Janc A.","year":"2018","unstructured":"A. Janc and M. Zalewski . 2014. Technical analysis of client identification mechanisms. (2014) . Retrieved March 15, 2018 from https:\/\/www.chromium.org\/Home\/chromium-security\/client-identification-mechanisms A. Janc and M. Zalewski. 2014. Technical analysis of client identification mechanisms. (2014). Retrieved March 15, 2018 from https:\/\/www.chromium.org\/Home\/chromium-security\/client-identification-mechanisms"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996770"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_13_1","volume-title":"Top Websites Ranking. (2018). Retrieved","author":"SimilarWeb LTD.","year":"2018","unstructured":"SimilarWeb LTD. 2018. Top Websites Ranking. (2018). Retrieved May 5, 2018 from https:\/\/www.similarweb.com\/top-websites SimilarWeb LTD. 2018. Top Websites Ranking. (2018). Retrieved May 5, 2018 from https:\/\/www.similarweb.com\/top-websites"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","year":"2018","unstructured":"NetMarketShare. 2018 . Browser Market Share. (2018) . Retrieved March 15, 2018 from https:\/\/netmarketshare.com\/browser-market-share.aspx NetMarketShare. 2018. Browser Market Share. (2018). Retrieved March 15, 2018 from https:\/\/netmarketshare.com\/browser-market-share.aspx"},{"key":"e_1_3_2_1_15_1","volume-title":"Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask. arXiv preprint arXiv:1805.10505","author":"Papadopoulos P.","year":"2018","unstructured":"P. Papadopoulos , N. Kourtellis , and E. P. Markatos . 2018 . Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask. arXiv preprint arXiv:1805.10505 (2018). P. Papadopoulos, N. Kourtellis, and E. P. Markatos. 2018. Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask. arXiv preprint arXiv:1805.10505 (2018)."},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Papenbrock J.","year":"2018","unstructured":"J. Papenbrock . 2018 . Aktuelle Marktanteile der Browser. (2018) . Retrieved March 15, 2018 from https:\/\/www.browser-statistik.de\/statistiken\/ J.Papenbrock. 2018. Aktuelle Marktanteile der Browser. (2018). Retrieved March 15, 2018 from https:\/\/www.browser-statistik.de\/statistiken\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"Perry M.","year":"2012","unstructured":"M. Perry . 2012 . Disable TLS Session resumption and Session IDs. (2012) . Retrieved March 15, 2018 from https:\/\/trac.torproject.org\/projects\/tor\/ticket\/4099 M. Perry. 2012. Disable TLS Session resumption and Session IDs. (2012). Retrieved March 15, 2018 from https:\/\/trac.torproject.org\/projects\/tor\/ticket\/4099"},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","author":"Project The","year":"2018","unstructured":"The OpenSSL Project . 2018 . OpenSSL Cryptography and SSL\/TLS Toolkit. (2018) . Retrieved March 15, 2018 from https:\/\/www.openssl.org\/ The OpenSSL Project. 2018. OpenSSL Cryptography and SSL\/TLS Toolkit. (2018). Retrieved March 15, 2018 from https:\/\/www.openssl.org\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. Internet-Draft TLS13. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-tls13-28 Work in Progress.  Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. Internet-Draft TLS13. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-tls13-28 Work in Progress.","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_20_1","unstructured":"E. Rescorla and T. Dierks. 2008. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246. (Aug. 2008).  E. Rescorla and T. Dierks. 2008. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246. (Aug. 2008)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987480"},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","year":"2018","unstructured":"StatCounter. 2018 . Browser Market Share Worldwide. (2018) . Retrieved March 15, 2018 from http:\/\/gs.statcounter.com\/browser-market-share StatCounter. 2018. Browser Market Share Worldwide. (2018). Retrieved March 15, 2018 from http:\/\/gs.statcounter.com\/browser-market-share"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","year":"2018","unstructured":"StatCounter. 2018 . Desktop vs Mobile vs Tablet Market Share Worldwide. (2018) . Retrieved March 15, 2018 from gs.statcounter.com\/platform-market-share\/desktop-mobile-tablet\/worldwide StatCounter. 2018. Desktop vs Mobile vs Tablet Market Share Worldwide. (2018). Retrieved March 15, 2018 from gs.statcounter.com\/platform-market-share\/desktop-mobile-tablet\/worldwide"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2017.8002897"}],"event":{"name":"ACSAC '18: 2018 Annual Computer Security Applications Conference","location":"San Juan PR USA","acronym":"ACSAC '18","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 34th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:56Z","timestamp":1750208276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":24,"alternative-id":["10.1145\/3274694.3274708","10.1145\/3274694"],"URL":"https:\/\/doi.org\/10.1145\/3274694.3274708","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}