literature:bibliography
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
literature:bibliography [2025/03/18 13:56] – archives | literature:bibliography [2025/03/19 08:55] (current) – identifier renaming karelkubicek | ||
---|---|---|---|
Line 299: | Line 299: | ||
@inproceedings{hantke2023you, | @inproceedings{hantke2023you, | ||
- | title={You call this archaeology? | + | |
- | | + | title = {You Call This Archaeology? |
- | booktitle={Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security}, | + | year = {2023}, |
- | pages={3168--3182}, | + | isbn = {9798400700507}, |
- | year={2023} | + | |
+ | | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | booktitle = {Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security}, | ||
+ | pages = {3168–3182}, | ||
+ | numpages | ||
+ | | ||
+ | | ||
+ | | ||
} | } | ||
Line 314: | Line 323: | ||
@inproceedings{lerner2016internet, | @inproceedings{lerner2016internet, | ||
- | title={Internet | + | title={Internet |
author={Lerner, | author={Lerner, | ||
booktitle={25th USENIX Security Symposium (USENIX Security 16)}, | booktitle={25th USENIX Security Symposium (USENIX Security 16)}, | ||
- | year={2016} | + | year={2016}, |
+ | url={https:// | ||
} | } | ||
+ | |||
@article{jha2024privacy, | @article{jha2024privacy, | ||
title={Privacy Policies and Consent Management Platforms: Growth and Users' Interactions over Time}, | title={Privacy Policies and Consent Management Platforms: Growth and Users' Interactions over Time}, | ||
Line 327: | Line 338: | ||
@inproceedings{amos2021privacy, | @inproceedings{amos2021privacy, | ||
- | title={Privacy policies over time: Curation and analysis of a million-document dataset}, | + | |
- | | + | title = {Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset}, |
- | booktitle={Proceedings of the Web Conference 2021}, | + | year = {2021}, |
- | pages={2165--2176}, | + | isbn = {9781450383127}, |
- | year={2021} | + | |
+ | | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | booktitle = {Proceedings of the Web Conference 2021}, | ||
+ | pages = {2165–2176}, | ||
+ | numpages | ||
+ | | ||
+ | | ||
+ | | ||
} | } | ||
@article{dimova2021cname, | @article{dimova2021cname, | ||
- | title={The | + | title={The |
author={Dimova, | author={Dimova, | ||
- | journal={arXiv preprint arXiv:2102.09301}, | + | journal={Proceedings on Privacy Enhancing Technologies}, |
+ | doi={10.2478/ | ||
+ | url={https:// | ||
+ | volume={2021}, | ||
+ | issue={3}, | ||
+ | pages={394–412}, | ||
year={2021} | year={2021} | ||
} | } | ||
Line 344: | Line 369: | ||
title={Out of sight, out of mind: Detecting orphaned web pages at internet-scale}, | title={Out of sight, out of mind: Detecting orphaned web pages at internet-scale}, | ||
author={Pletinckx, | author={Pletinckx, | ||
- | booktitle={Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security}, | + | |
- | pages={21--35}, | + | isbn = {9781450384544}, |
- | | + | publisher = {Association for Computing Machinery}, |
+ | address = {New York, NY, USA}, | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | | ||
+ | pages = {21–35}, | ||
+ | | ||
+ | keywords = {measurement, | ||
+ | location = {Virtual Event, Republic of Korea}, | ||
+ | series = {CCS '21} | ||
} | } | ||
@inproceedings{roth2020complex, | @inproceedings{roth2020complex, | ||
- | title={Complex security policy? | + | title={Complex security policy? |
author={Roth, | author={Roth, | ||
booktitle={Proceedings of the 27th Network and Distributed System Security Symposium (NDSS)}, | booktitle={Proceedings of the 27th Network and Distributed System Security Symposium (NDSS)}, | ||
Line 357: | Line 391: | ||
@inproceedings{stock2017web, | @inproceedings{stock2017web, | ||
- | title={How the Web Tangled Itself: Uncovering the History of $\{$Client-Side$\}$ Web ($\{$In) Security$\}$}, | + | title={How the Web Tangled Itself: Uncovering the History of Client-Side Web (In) Security}, |
author={Stock, | author={Stock, | ||
- | booktitle={26th USENIX Security Symposium (USENIX Security 17)}, | + | booktitle = {26th USENIX Security Symposium (USENIX Security 17)}, |
- | pages={971--987}, | + | year = {2017}, |
- | year={2017} | + | isbn = {978-1-931971-40-9}, |
+ | address = {Vancouver, BC}, | ||
+ | pages = {971--987}, | ||
+ | url = {https:// | ||
+ | publisher = {USENIX Association}, | ||
+ | month = aug | ||
+ | } | ||
+ | } | ||
+ | |||
+ | @inproceedings{bouhoula2024automated, | ||
+ | author = {Ahmed Bouhoula and Karel Kubicek and Amit Zac and Carlos Cotrini and David Basin}, | ||
+ | title = {Automated Large-Scale Analysis of Cookie Notice Compliance}, | ||
+ | booktitle = {33rd USENIX Security Symposium (USENIX Security 24)}, | ||
+ | year = {2024}, | ||
+ | isbn = {978-1-939133-44-1}, | ||
+ | address = {Philadelphia, | ||
+ | pages = {1723--1739}, | ||
+ | url = {https:// | ||
+ | publisher = {USENIX Association}, | ||
+ | month = aug | ||
+ | } | ||
+ | |||
+ | @inproceedings{khandelwal2023automated, | ||
+ | | ||
+ | title = {Automated Cookie Notice Analysis and Enforcement}, | ||
+ | | ||
+ | year = {2023}, | ||
+ | isbn = {978-1-939133-37-3}, | ||
+ | | ||
+ | pages = {1109--1126}, | ||
+ | url = {https:// | ||
+ | | ||
+ | month = aug | ||
+ | } | ||
+ | |||
+ | @inproceedings{urban2020beyond, | ||
+ | | ||
+ | title = {Beyond the Front Page: | ||
+ | year = {2020}, | ||
+ | isbn = {9781450370233}, | ||
+ | | ||
+ | | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | | ||
+ | pages = {1275–1286}, | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | } | ||
+ | |||
+ | @inproceedings{zeber2020representativeness, | ||
+ | | ||
+ | title = {The Representativeness of Automated Web Crawls as a Surrogate for Human Browsing}, | ||
+ | year = {2020}, | ||
+ | isbn = {9781450370233}, | ||
+ | | ||
+ | | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | | ||
+ | pages = {167–178}, | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | } | ||
+ | |||
+ | @inproceedings{englehardt2016online, | ||
+ | | ||
+ | title = {Online Tracking: A 1-million-site Measurement and Analysis}, | ||
+ | year = {2016}, | ||
+ | isbn = {9781450341394}, | ||
+ | | ||
+ | | ||
+ | url = {https:// | ||
+ | doi = {10.1145/ | ||
+ | | ||
+ | pages = {1388–1401}, | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | } | ||
+ | |||
+ | @inproceedings{bashir2016tracing, | ||
+ | title={Tracing information flows between ad exchanges using retargeted ads}, | ||
+ | author={Bashir, | ||
+ | booktitle={25th USENIX Security Symposium (USENIX Security 16)}, | ||
+ | pages={481--496}, | ||
+ | year={2016}, | ||
+ | url={https:// | ||
+ | } | ||
+ | |||
+ | @inproceedings{fouad2022my, | ||
+ | title={My Cookie is a phoenix: Detection, measurement, | ||
+ | author={Fouad, | ||
+ | booktitle={PETS 2022-22nd Privacy Enhancing Technologies Symposium}, | ||
+ | year={2022}, | ||
+ | doi={10.56553/ | ||
+ | url={https:// | ||
} | } | ||
</ | </ |
literature/bibliography.1742306172.txt.gz · Last modified: 2025/03/18 13:56 by archives