L. D. Baron, Preventing attacks on a user's history through css :visited selectors, 2010.

A. Bortz and D. Boneh, Exposing private information by timing web applications, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.621-628, 2007.
DOI : 10.1145/1242572.1242656

. Bugzilla, Bug 147777 -:visited support allows queries into global history, 2002.

P. Eckersley, How unique is your web browser? In Privacy Enhancing Technologies, pp.1-18, 2010.

E. W. Felten and M. A. Schneider, Timing attacks on Web privacy, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.25-32, 2000.
DOI : 10.1145/352600.352606

C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell, Protecting browser state from web privacy attacks, Proceedings of the 15th international conference on World Wide Web , WWW '06, pp.737-744, 2006.
DOI : 10.1145/1135777.1135884

A. Janc and L. Olejnik, What the internet knows about you

A. Janc and L. Olejnik, Web Browser History Detection as a Real-World Privacy Threat, ESORICS, pp.215-231, 2010.
DOI : 10.1007/978-3-642-15497-3_14

D. Jang, R. Jhala, S. Lerner, and H. Shacham, An empirical study of privacy-violating information flows in JavaScript web applications, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.270-83, 2010.
DOI : 10.1145/1866307.1866339

B. Krishnamurthy and C. Wills, Privacy diffusion on the web, Proceedings of the 18th international conference on World wide web, WWW '09, pp.541-550, 2009.
DOI : 10.1145/1526709.1526782

S. Krishnan and F. Monrose, Dns prefetching and its privacy implications: when good things go bad In Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, LEET'10, pp.10-10, 2010.

B. Miller, Vital signs of identity [biometrics], IEEE Spectrum, vol.31, issue.2, pp.22-30, 1994.
DOI : 10.1109/6.259484

R. Moskovitch, C. Feher, A. Messerman, N. Kirschnick, T. Mustafic et al., Identity theft, computers and behavioral biometrics, 2009 IEEE International Conference on Intelligence and Security Informatics, pp.155-160, 2009.
DOI : 10.1109/ISI.2009.5137288

K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham, Fingerprinting information in javascript implementations, Proceedings of W2SP 2011, 2011.

. Trendmicro, Trend micro site safety center

Z. Weinberg, E. Y. Chen, P. R. Jayaraman, and C. Jackson, I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks, 2011 IEEE Symposium on Security and Privacy, pp.147-161, 2011.
DOI : 10.1109/SP.2011.23

C. E. Wills, M. Mikhailov, and H. Shang, Inferring relative popularity of internet applications by actively querying DNS caches, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, pp.78-90, 2003.
DOI : 10.1145/948205.948216

G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, A practical attack to de-anonymize social network users, ieee security and privacy, IEEE Security and Privacy, 2010.

R. V. Yampolskiy and V. Govindaraju, Behavioural biometrics: a survey and classification, International Journal of Biometrics, vol.1, issue.1, pp.81-113, 2008.
DOI : 10.1504/IJBM.2008.018665

T. Yen, X. Huang, F. Monrose, and M. K. Reiter, Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications, Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '09, pp.157-175, 2009.
DOI : 10.1007/978-3-540-31966-5_7

T. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, Host fingerprinting and tracking on the web:privacy and security implications, 19th Annual Network and Distributed System Security Symposium (NDSS) 2012, Internet Society, 2012.

M. Zalewski, Browser security handbook, part 2, 2009.