Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23108
|View full text |Cite
|
Sign up to set email alerts
|

Bloom Cookies: Web Search Personalization without User Tracking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 41 publications
0
6
0
1
Order By: Relevance
“…Similarly, SplixX uses differentially private queries over distributed user data. Furthermore, another noisy technique 'Bloom cookies' [66] presents a framework for privacy preserving personalization of web searches of locally derived profile. In our previous works, we propose 'ProfileGuard' [5], [15] that is an app-based profile obfuscation mechanism and a privacy-preserving mobile advertising system based on various implementation of Private Information Retrieval (PIR) [2].…”
Section: Privacy and Mobile Analytics Servicesmentioning
confidence: 99%
“…Similarly, SplixX uses differentially private queries over distributed user data. Furthermore, another noisy technique 'Bloom cookies' [66] presents a framework for privacy preserving personalization of web searches of locally derived profile. In our previous works, we propose 'ProfileGuard' [5], [15] that is an app-based profile obfuscation mechanism and a privacy-preserving mobile advertising system based on various implementation of Private Information Retrieval (PIR) [2].…”
Section: Privacy and Mobile Analytics Servicesmentioning
confidence: 99%
“…A novel noisy technique for privacy preserving personalisation of web searches was also recently proposed [166]. In this work, the authors use 'Bloom' cookies that comprise a noisy version of the locally derived profile.…”
Section: Randomisationmentioning
confidence: 99%
“…Ada banyak penelitian yang berkaitan dengan pendeteksian lalu lintas HTTP dan penggunaan aplikasi yang membaca lalu lintas permintaan dari server. Hal yang paling sederhana terletak pada protokol jaringan HTTP yang banyak di akses ke aplikasi berbasis web sudah semakin meluas (Mor, Riva, Nath, & Kubiatowicz, 2015). Hal ini disebabkan kinerja protokol jaringan HTTP lebih ringan dibandingkan protokol jaringan HTTPS menggunakan protokol SSL yang memiliki tiga tingkat pengamanan data.…”
Section: Pendahuluanunclassified