Enabling care continuity using a digital health wallet
Samuel Osebe, Aisha Walcott-Bryant, et al.
ICHI 2019
Adversaries employ sophisticated fingerprinting techniques to identify Web users and record their browsing history and Web interactions. Fingerprinting leaves no footprint on the browser and is invisible to general Web users, who often lack basic knowledge of it. An analysis of fingerprinting techniques and tools revealed the fingerprinting workflow. This helped define fine-grained properties that precisely model the workflow, allowing development of a client-side fingerprinting-detection tool. This article is part of a special issue on Security and Privacy on the Web.
Samuel Osebe, Aisha Walcott-Bryant, et al.
ICHI 2019
Celia Cintas, Skyler Speakman, et al.
Pattern Recognition Letters
Maja Vukovic, Komminist Weldemariam
Smart Sustain. Manufact. Syst.
M. Zeni, Komminist Weldemariam
IBM J. Res. Dev