共 27 条
- [1] Warren SD(1890)The right to privacy Harvard Law Rev. 4 193-220
- [2] Brandeis LD(1999)Internet privacy concerns confirm the case for intervention Commun. ACM 42 60-67
- [3] Clarke R(1993)"How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use MIS Quarterly 17 341-90
- [4] Culnan Mary J.(2014)Improving Operating system fingerprinting using machine learning techniques Int. J. Comput. Theor. Eng. 6 57-262
- [5] Al-Shehari T(1981)Untraceable electronic mail, return addresses, and digital pseudonyms Commun. ACM 24 84-4241
- [6] Shahzad F(2013)Survey on JavaScript security policies and their enforcement mechanisms in a web browser J. Logic Algebr. Progr. 82 243-2093
- [7] Chaum DL(2015)The web browser factor in traffic analysis attacks Secur. Commun. Netw. 8 4227-1944
- [8] Bielova N(2014)A combined solution for the Internet access denial caused by malicious Internet service providers Secur. Commun. Netw. 7 2078-88
- [9] Zhioua S(2014)Privacy-assured substructure similarity query over encrypted graph-structured data in cloud Secur. Commun. Netw. 7 1933-375
- [10] Abu-Amara M(2001)A guided tour to approximate string matching ACM Comput. Surv. (CSUR) 33 31-1066