Preventing attacks on a user's history through css :visited selectors, 2010. ,
Exposing private information by timing web applications, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.621-628, 2007. ,
DOI : 10.1145/1242572.1242656
Bug 147777 -:visited support allows queries into global history, 2002. ,
How unique is your web browser? In Privacy Enhancing Technologies, pp.1-18, 2010. ,
Timing attacks on Web privacy, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.25-32, 2000. ,
DOI : 10.1145/352600.352606
Protecting browser state from web privacy attacks, Proceedings of the 15th international conference on World Wide Web , WWW '06, pp.737-744, 2006. ,
DOI : 10.1145/1135777.1135884
What the internet knows about you ,
Web Browser History Detection as a Real-World Privacy Threat, ESORICS, pp.215-231, 2010. ,
DOI : 10.1007/978-3-642-15497-3_14
An empirical study of privacy-violating information flows in JavaScript web applications, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.270-83, 2010. ,
DOI : 10.1145/1866307.1866339
Privacy diffusion on the web, Proceedings of the 18th international conference on World wide web, WWW '09, pp.541-550, 2009. ,
DOI : 10.1145/1526709.1526782
Dns prefetching and its privacy implications: when good things go bad In Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, LEET'10, pp.10-10, 2010. ,
Vital signs of identity [biometrics], IEEE Spectrum, vol.31, issue.2, pp.22-30, 1994. ,
DOI : 10.1109/6.259484
Identity theft, computers and behavioral biometrics, 2009 IEEE International Conference on Intelligence and Security Informatics, pp.155-160, 2009. ,
DOI : 10.1109/ISI.2009.5137288
Fingerprinting information in javascript implementations, Proceedings of W2SP 2011, 2011. ,
Trend micro site safety center ,
I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks, 2011 IEEE Symposium on Security and Privacy, pp.147-161, 2011. ,
DOI : 10.1109/SP.2011.23
Inferring relative popularity of internet applications by actively querying DNS caches, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, pp.78-90, 2003. ,
DOI : 10.1145/948205.948216
A practical attack to de-anonymize social network users, ieee security and privacy, IEEE Security and Privacy, 2010. ,
Behavioural biometrics: a survey and classification, International Journal of Biometrics, vol.1, issue.1, pp.81-113, 2008. ,
DOI : 10.1504/IJBM.2008.018665
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications, Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '09, pp.157-175, 2009. ,
DOI : 10.1007/978-3-540-31966-5_7
Host fingerprinting and tracking on the web:privacy and security implications, 19th Annual Network and Distributed System Security Symposium (NDSS) 2012, Internet Society, 2012. ,
Browser security handbook, part 2, 2009. ,