Author of the publication

Web Browser History Detection as a Real-World Privacy Threat.

, and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 215-231. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy., , , and . ACM Conference on Computer and Communications Security, page 1376-1387. ACM, (2016)Information Leaks via Safari's Intelligent Tracking Prevention., , , and . CoRR, (2020)CSP Is Dead, Long Live CSP!, , , and . page 207-238. Magdeburger Institut für Sicherheitsforschung, Magdeburg, (2017)Adopting Strict Content Security Policy for XSS Protection., , and . SecDev, page 149. IEEE Computer Society, (2016)On the uniqueness of Web browsing history patterns., , and . Ann. des Télécommunications, 69 (1-2): 63-74 (2014)Oh, the Places You'll Go! Finding Our Way Back from the Web Platform's Ill-conceived Jaunts., and . EuroS&P Workshops, page 673-680. IEEE, (2020)Web Browser History Detection as a Real-World Privacy Threat., and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 215-231. Springer, (2010)eLearning in the Web 2.0 Era - Lessons from the Development of the Lingro.com Language Learning Environment., , and . BIS (Workshops), volume 37 of Lecture Notes in Business Information Processing, page 201-211. Springer, (2009)