↓ Skip to main content

Computer Security - ESORICS 2010

Overview of attention for book
Cover of 'Computer Security - ESORICS 2010'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A New Framework for RFID Privacy
  3. Altmetric Badge
    Chapter 2 Readers Behaving Badly
  4. Altmetric Badge
    Chapter 3 Privacy-Preserving, Taxable Bank Accounts
  5. Altmetric Badge
    Chapter 4 Formal Analysis of Privacy for Vehicular Mix-Zones
  6. Altmetric Badge
    Chapter 5 IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time
  7. Altmetric Badge
    Chapter 6 A Theory of Runtime Enforcement, with Results
  8. Altmetric Badge
    Chapter 7 Enforcing Secure Object Initialization in Java
  9. Altmetric Badge
    Chapter 8 Flexible Scheduler-Independent Security
  10. Altmetric Badge
    Chapter 9 Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
  11. Altmetric Badge
    Chapter 10 A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Σ-Protocols
  12. Altmetric Badge
    Chapter 11 Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model
  13. Altmetric Badge
    Chapter 12 DR@FT: Efficient Remote Attestation Framework for Dynamic Systems
  14. Altmetric Badge
    Chapter 13 Website Fingerprinting and Identification Using Ordered Feature Sequences
  15. Altmetric Badge
    Chapter 14 Web Browser History Detection as a Real-World Privacy Threat
  16. Altmetric Badge
    Chapter 15 On the Secrecy of Spread-Spectrum Flow Watermarks
  17. Altmetric Badge
    Chapter 16 Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
  18. Altmetric Badge
    Chapter 17 A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection
  19. Altmetric Badge
    Chapter 18 Kamouflage: Loss-Resistant Password Management
  20. Altmetric Badge
    Chapter 19 Sequential Protocol Composition in Maude-NPA
  21. Altmetric Badge
    Chapter 20 Verifying Security Property of Peer-to-Peer Systems Using CSP
  22. Altmetric Badge
    Chapter 21 Modeling and Analyzing Security in the Presence of Compromising Adversaries
  23. Altmetric Badge
    Chapter 22 On Bounding Problems of Quantitative Information Flow
  24. Altmetric Badge
    Chapter 23 On E-Vote Integrity in the Case of Malicious Voter Computers
  25. Altmetric Badge
    Chapter 24 Election Verifiability in Electronic Voting Protocols
  26. Altmetric Badge
    Chapter 25 Pretty Good Democracy for More Expressive Voting Schemes
  27. Altmetric Badge
    Chapter 26 Efficient Multi-dimensional Key Management in Broadcast Services
  28. Altmetric Badge
    Chapter 27 Caught in the Maze of Security Standards
  29. Altmetric Badge
    Chapter 28 User-Role Reachability Analysis of Evolving Administrative Role Based Access Control
  30. Altmetric Badge
    Chapter 29 An Authorization Framework Resilient to Policy Evaluation Failures
  31. Altmetric Badge
    Chapter 30 Optimistic Fair Exchange with Multiple Arbiters
  32. Altmetric Badge
    Chapter 31 Speaker Recognition in Encrypted Voice Streams
  33. Altmetric Badge
    Chapter 32 Evaluating Adversarial Partitions
  34. Altmetric Badge
    Chapter 33 Providing Mobile Users’ Anonymity in Hybrid Networks
  35. Altmetric Badge
    Chapter 34 Complexity of Anonymity for Security Protocols
  36. Altmetric Badge
    Chapter 35 k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
  37. Altmetric Badge
    Chapter 36 Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information
  38. Altmetric Badge
    Chapter 37 RatFish: A File Sharing Protocol Provably Secure against Rational Users
  39. Altmetric Badge
    Chapter 38 A Service Dependency Model for Cost-Sensitive Intrusion Response
  40. Altmetric Badge
    Chapter 39 Secure Code Update for Embedded Devices via Proofs of Secure Erasure
  41. Altmetric Badge
    Chapter 40 D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
  42. Altmetric Badge
    Chapter 41 Low-Cost Client Puzzles Based on Modular Exponentiation
  43. Altmetric Badge
    Chapter 42 Expressive, Efficient and Obfuscation Resilient Behavior Based IDS
Attention for Chapter 14: Web Browser History Detection as a Real-World Privacy Threat
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
47 Mendeley
citeulike
2 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Web Browser History Detection as a Real-World Privacy Threat
Chapter number 14
Book title
Computer Security – ESORICS 2010
Published by
Springer, Berlin, Heidelberg, September 2010
DOI 10.1007/978-3-642-15497-3_14
Book ISBNs
978-3-64-215496-6, 978-3-64-215497-3
Authors

Artur Janc, Lukasz Olejnik

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 47 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Germany 2 4%
Korea, Republic of 1 2%
Netherlands 1 2%
Spain 1 2%
Unknown 42 89%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 13 28%
Student > Master 10 21%
Researcher 5 11%
Other 3 6%
Student > Bachelor 2 4%
Other 8 17%
Unknown 6 13%
Readers by discipline Count As %
Computer Science 31 66%
Social Sciences 3 6%
Engineering 2 4%
Physics and Astronomy 1 2%
Psychology 1 2%
Other 1 2%
Unknown 8 17%