{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:28Z","timestamp":1750220788202,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T00:00:00Z","timestamp":1592870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1659645,1919004"],"award-info":[{"award-number":["1659645,1919004"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,23]]},"DOI":"10.1145\/3391812.3396267","type":"proceedings-article","created":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T23:14:35Z","timestamp":1592349275000},"page":"31-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["2020 Vision for Web Privacy"],"prefix":"10.1145","author":[{"given":"Eric","family":"Chan-Tin","sequence":"first","affiliation":[{"name":"Loyola University Chicago, Chicago, IL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Panopticlick https:\/\/panopticlick.eff.org\/  Panopticlick https:\/\/panopticlick.eff.org\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Franziska Roesner Tadayoshi Kohno and David Wetherall. \"Detecting and defending against third-party tracking on the web \" Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 2012.  Franziska Roesner Tadayoshi Kohno and David Wetherall. \"Detecting and defending against third-party tracking on the web \" Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"A. Hintz \"Fingerprinting websites using traffic analysis \" International Workshop on Privacy Enhancing Technologies (PET) 2002.  A. Hintz \"Fingerprinting websites using traffic analysis \" International Workshop on Privacy Enhancing Technologies (PET) 2002.","DOI":"10.1007\/3-540-36467-6_13"}],"event":{"name":"HPDC '20: The 29th International Symposium on High-Performance Parallel and Distributed Computing","sponsor":["University of Arizona University of Arizona","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Stockholm Sweden","acronym":"HPDC '20"},"container-title":["Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3391812.3396267","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3391812.3396267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:41Z","timestamp":1750200101000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3391812.3396267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,23]]},"references-count":3,"alternative-id":["10.1145\/3391812.3396267","10.1145\/3391812"],"URL":"https:\/\/doi.org\/10.1145\/3391812.3396267","relation":{},"subject":[],"published":{"date-parts":[[2020,6,23]]},"assertion":[{"value":"2020-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}