, European Commission: Proposal for a regulation on privacy and electronic communications, pp.2017-2028
, , pp.2017-2028
The European Court of Justice case of Breyer, Journal of Information Rights, vol.2, issue.1, 2017. ,
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, 2010. ,
k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
l-diversity: Privacy beyond k-anonymity, Proceedings of the 22nd International Conference on Data Engineering (ICDE'06), pp.24-24, 2006. ,
t-closeness: Privacy beyond k-anonymity and l-diversity, Proceedings of the 23rd International Conference on Data Engineering (ICDE'07), pp.106-115, 2007. ,
Differential privacy, Automata, Languages and Programming, vol.4052 ,
, Article 29 Data Protection Working Party: Opinion 05/2014 on Anonymisation Techniques, 2014.
LAP: Lightweight anonymity and privacy, Security and Privacy, pp.506-520, 2012. ,
Anonymity Online for Everyone: What is missing for zero-effort privacy on the Internet?, International Workshop on Open Problems in Network Security, pp.82-94, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01445796
, A Survey on Web Tracking: Mechanisms, Implications, and Defenses. Proceedings of the IEEE, 2017.
Measuring price discrimination and steering on e-commerce web sites, Proceedings of the 2014 conference on internet measurement conference, pp.305-318, 2014. ,
Giving Web a Memory Cost Its Users Privacy, pp.2017-2028 ,
Disable TLS Session resumption and Session IDs, pp.2017-2028 ,
Remote physical device fingerprinting, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.2, pp.93-108, 2005. ,
Apple Has Quietly Started Tracking iPhone Users Again, And It's Tricky To Opt Out, pp.2017-2028 ,
, Pixel perfect: Fingerprinting canvas in HTML5. Proceedings of W2SP, pp.1-12, 2012.
Automatically labeling web pages based on normal user actions, Procedings of the IJCAI Workshop on Machine Learning for Information Filtering, 1999. ,
Authentication via keystroke dynamics, Proceedings of the 4th ACM conference on Computer and communications security, pp.48-56, 1997. ,
Clickprints on the web: Are there signatures in web browsing data, 2007. ,
Biometric authentication and identification using keystroke dynamics: A survey, Journal of Pattern Recognition Research, vol.7, issue.1, pp.116-139, 2012. ,
AppPETs: A Framework for PrivacyPreserving Apps, SAC 2018: Symposium on Applied Computing, 2018. ,
Recon: Revealing and controlling pii leaks in mobile network traffic, Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, pp.361-374, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01386899
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic, Computers & Security, vol.39, pp.17-33, 2013. ,
, The Tails Project: Tails, pp.2017-2028
, The Qubes OS Project: Qubes OS, pp.2017-2028
, Whonix developers: Whonix OS, pp.2017-2028
, , pp.2017-2028
, , pp.2017-2028
, Xen developers: Xen Project, pp.2017-2028
, Open Source Security, pp.2017-2028
Description of Tor Stream Isolation, pp.2017-2028 ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981. ,
ISDN-mixes: Untraceable communication with very small bandwidth overhead, Kommunikation in verteilten Systemen, pp.451-463, 1991. ,
MIXes in mobile communication systems: Location management with privacy, Information Hiding, pp.121-135, 1996. ,
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System, Information Hiding, vol.98, pp.83-98, 1998. ,
Blind signatures for untraceable payments, Advances in cryptology, pp.199-203, 1983. ,
Security without identification: Transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of cryptology, vol.1, issue.1, pp.65-75, 1988. ,
Value exchange systems enabling security and unobservability, Computers & Security, vol.9, issue.8, pp.715-721, 1990. ,
Preserving privacy in a network of mobile computers, IEEE, pp.26-38, 1995. ,
Hiding routing information, Information Hiding, pp.137-150, 1996. ,
, , pp.2017-2028
, , pp.2017-2028
, Status der Mixkaskaden, pp.2017-2028
Anonymität Online der nächsten Generation, pp.2017-2028 ,
Tor: The second-generation onion router, 2004. ,
, Tor Project: Tor Metrics, pp.2017-2028
The Design and Implementation of the Tor Browser, 2017. ,
IPv6 Address Assignment to End Sites, RFC Editor, 2011. ,