HTML (2nd ed.): the definitive guide
HTML (2nd ed.): the definitive guide
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
JavaScript: The Definitive Guide
JavaScript: The Definitive Guide
How to Make Personalized Web Browising Simple, Secure, and Anonymous
FC '97 Proceedings of the First International Conference on Financial Cryptography
Security of web browser scripting languages: vulnerabilities, attacks, and remedies
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Anonymous Web transactions with Crowds
Communications of the ACM
SAWM: a tool for secure and authenticated web metering
SEKE '02 Proceedings of the 14th international conference on Software engineering and knowledge engineering
An Architecture for Secure Generation and Verification of Electronic Coupons
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Duplicate detection in click streams
WWW '05 Proceedings of the 14th international conference on World Wide Web
Using association rules for fraud detection in web advertising networks
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Proceedings of the 16th international conference on World Wide Web
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
International Journal of Information and Computer Security
SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting
Proceedings of the VLDB Endowment
The dark side of the Internet: Attacks, costs and responses
Information Systems
Detecting frauds in online advertising systems
EC-Web'06 Proceedings of the 7th international conference on E-Commerce and Web Technologies
Proceedings of the 15th International Conference on Extending Database Technology
Streaming quotient filter: a near optimal approximate duplicate detection approach for data streams
Proceedings of the VLDB Endowment
Hi-index | 0.02 |
A web user "clicks through" one web site, the referrer, to another web site, the target, if the user follows a hypertext link to the target's site contained in a web page served from the referrer's site. Numerous click-through payment programs have been established on the web, by which (the webmaster of) a target site pays a referrer site for each click through that referrer to the target. However, typically the referrer has no ability to verify that it is paid for every click-through to the target for which it is responsible. Thus, targets can undetectably omit to pay referrers for some number of click-throughs, a practice called hit shaving. In this paper, we explore simple and immediately useful approaches to enable referrers to monitor the number of click-throughs for which they should be paid.