The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014. ,
DOI : 10.1145/2660267.2660347
On the Unicity of Smartphone Applications, Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, WPES '15, pp.27-36, 2015. ,
DOI : 10.1145/2808138.2808146
URL : https://hal.archives-ouvertes.fr/hal-01181040
User Tracking on the Web via Cross-Browser Fingerprinting, Lecture Notes in Computer Science, vol.7161, pp.31-46, 2012. ,
DOI : 10.1007/978-3-642-29615-4_4
A Survey on Web Tracking: Mechanisms, Implications, and Defenses, Proceedings of the IEEE, 2015. ,
DOI : 10.1109/JPROC.2016.2637878
Touching from a distance, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382260
Maximum Coverage Problem with Group Budget Constraints and Applications, Approximation , Randomization, and Combinatorial Optimization, pp.72-83, 2004. ,
DOI : 10.1007/978-3-540-27821-4_7
Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, 2013. ,
DOI : 10.1038/srep01376
Unique in the shopping mall: On the reidentifiability of credit card metadata, Science, vol.347, issue.6221, p.347, 2015. ,
DOI : 10.1126/science.1256297
How Unique Is Your Web Browser?, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, pp.1-18, 2010. ,
DOI : 10.1007/978-3-642-14527-8_1
How Unique Is Your Web Browser?, Privacy Enhancing Technologies, pp.1-18, 2010. ,
DOI : 10.1007/978-3-642-14527-8_1
A threshold of ln n for approximating set cover, Journal of the ACM, vol.45, issue.4, pp.634-652, 1998. ,
DOI : 10.1145/285055.285059
Improve persistence and webfont compatibility of font patch, comment #13. https://trac.torproject.org/projects/ tor/ticket, p.13, 2013. ,
The anonymous internet, 2014. ,
Update your tor browser settings -otherwise it is less anonymous than you would think. https://gulyas.info/blog/read/16/2015-11- 30-Update-your-TOR-Browser-settings-otherwise-it-is-less- anonymous-than-you-would-think, p.2015 ,
k-fingerprinting: a robust scalable website fingerprinting technique, 2015. ,
SIMD compression and the intersection of sorted integers. CoRR, abs/1401, 2014. ,
Twitter is tracking users' installed apps for ad targeting. http://blogs.wsj.com/cmotwitter- is-tracking-users-installed-apps-for-ad-targeting, p.2014, 2014. ,
The design and implementation of the tor browser [draft], p.2015 ,
Efficient algorithms for masking and finding quasi-identifiers, VLDB, 2007. ,
An analysis of approximations for maximizing submodular set functions???I, Mathematical Programming, vol.16, issue.1, pp.265-294, 1978. ,
DOI : 10.1007/BF01588971
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013. ,
DOI : 10.1109/SP.2013.43
On the uniqueness of Web browsing history patterns, annals of telecommunications - annales des t??l??communications, vol.1, issue.1-2, 2014. ,
DOI : 10.1007/s12243-013-0392-5
URL : https://hal.archives-ouvertes.fr/hal-00917042
Carat, Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, SenSys '13, 2013. ,
DOI : 10.1145/2517351.2517354
The company you keep, Proceedings of the 23rd international conference on World wide web, WWW '14, 2014. ,
DOI : 10.1145/2566486.2568046
Anonymization of location data does not work, Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom '11, 2011. ,
DOI : 10.1145/2030613.2030630