. Bravo and J. Fontecha, “A Context Model based on Ontological Languages: a Proposal for Information Visualization,” Journal of Universal Computer Science , vol. 16, no. 12, pp. 1539–1555, 2010.
 E. Serral, P. Valderas and V. Pelechano, “Context-Adaptive Coordination of Pervasive Services by Interpreting Models during Runtime,” The Computer Journal, vol. 56, no. 1, pp. 87–114, 2013. https://doi.org/10.1093/comjnl/bxs019
 S. Bērziša, G. Bravos, T. Gonzalez, U. Czubayko, S. España, J. Grabis, M. Henkel, L. Jokste, J. Kampars, H. Koç, J. Kuhr, C
Yao Li, Alfred Kobsa, Bart P. Knijnenburg and M-H. Carolyn Nguyen
Systems, 1994 , pages 357–361, Nov. 1994.
 M. H. Hoppe. A comparative study of country elites: International differences in work-related values and learning and their implications for management training and development . PhD thesis, University of North Carolina at Chapel Hill, 1990.
 R. J. House, P. J. Hanges, M. Javidan, P. W. Dorfman, and V. Gupta. Culture, Leadership, and Organizations: The GLOBE Study of 62 Societies . SAGE Publications, Apr. 2004.
 L. K. John, A. Acquisti, and G. Loewenstein. Strangers on a Plane: Context
-Baltic Summer School on Applications of AI to Production Engineering , Kaunas, Lithuania, 9-14 June 1997, K. Wang and H. Pranevicius, Eds. Kaunas: Kaunas University of Technology Press, 1997.
O. Nikiforova and N. Pavlova, "Foundations on generation of relationships between classes based on initial business knowledge," in 17th International Conference on Information Systems Development (ISD2008) , Paphos, Cyprus, August 25-27, 2008, Information Systems Development, G. A. Papadopoulos, W. Wojtkowski, W. G. Wojtkowski, S. Wrycza, and J. Zupancic, Eds
. Hiding information in flash memory. In Security and Privacy (SP), 2013 IEEE Symposium on , pages 271–285, May 2013.
 “How a Syrian refugee risked his life to bear witness to atrocities” . “ https://www.thestar.com/news/world/2012/03/14/how_a_syrian_refugee_risked_his_life_to_bear_witness_to_atrocities.html ”.
 “Former Press Writer Mike Giglio Detained, Beaten and Released During Egypt Protests” . “ http://www.houstonpress.com/news/former-press-writer-mike-giglio-detained-beaten-and-released-during-egypt-protests-6722336 ”.
. Shrimpton, “Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail,” in Security and Privacy (SP), 2012 IEEE Symposium on . IEEE, 2012, pp. 332–346.
 C. Livadas, R. Walsh, D. Lapsley, and W. T. Strayer, “Using machine learning techniques to identify botnet traffic,” in In 2nd IEEE LCN Workshop on Network Security , 2006, pp. 967–974.
 F. Tegeler, X. Fu, G. Vigna, and C. Kruegel, “Botfinder: Finding bots in network traffic without deep packet inspection,” in Proceedings of the 8th international conference on Emerging
Justin Brookman, Phoebe Rouge, Aaron Alva and Christina Yeung
://www.ftc.gov/news-events/press-releases/2012/12/ftc-settlement-puts-end-history-sniffing-online-advertising , Dec. 2012.
 Fed. Trade Comm’n, “Online Advertiser Settles FTC Charges ScanScout Deceptively Used Flash Cookies to Track Consumers Online,” https://www.ftc.gov/news-events/press-releases/2011/11/online-advertiser-settles-ftc-charges-scanscout-deceptively-used , Nov. 2011.
 Fed. Trade Comm’n, “FTC Puts an End to Tactics of Online Advertising Company That Deceived Consumers Who Wanted to ’Opt Out’ from Targeted Ads,” https://www.ftc.gov/news-events/press-releases/2011/03/ftc
-ordered-to-stoptracking-non-users-in-Belgium-or-face-fines.html [Accessed 22-Feb-2016].
 P. Dixon. Testimony of Pam Dixon executive director, World Privacy Forum before the Senate Committee on Commerce, Science, and Transportation, “what information do data brokers have on consumers, and how do they use it?”, 2013. http://www.worldprivacyforum.org/wp-content/uploads/2013/12/WPF_PamDixon_CongressionalTestimony_DataBrokers_2013_fs.pdf [Accessed: 15- Jul- 2015].
 Equifax. Equifax 2014 annual report, 2014. http://www.equifax.com/pdfs/corp/Equifax_2014_Annual_Report.pdf [Accessed: 03- Aug- 2015
] D. Chaum and E. van Heyst. Group signatures. In D. Davies, editor, EUROCRYPT ’91 , pages 257–265. Springer, 1991.
 Ronald Cramer, Ivan Damgård, and Berry Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Yvo G. Desmedt, editor, CRYPTO , pages 174–187. Springer, 1994.
 I. Damgård. Towards practical public key systems secure against chosen ciphertext attacks. In J. Feigenbaum, editor, Advances in Cryptology — CRYPTO ’91 , pages 445–456. Springer, 1992.
 U. Feige and A. Shamir. Witness
Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan and Benny Pinkas
Distributed System Security Symposium (NDSS’11) . The Internet Society, 2011.
 R. Nojima and Y. Kadobayashi, “Cryptographically secure Bloom-filters,” Trans. Data Privacy , vol. 2, no. 2, pp. 131–139, 2009.
 A. Pagh, R. Pagh, and S. S. Rao, “An optimal Bloom filter replacement,” in ACM-SIAM Symposium on Discrete Algorithms (SODA’05) . SIAM, 2005, pp. 823–829.
 A. Partow, “Bloom filter implementation,” https://github.com/ArashPartow/bloom , 2017, accessed: 2017-03-10.
 B. Pinkas, T. Schneider, G. Segev, and M. Zohner, “Phasing
Daniel Demmler, Peter Rindal, Mike Rosulek and Ni Trieu
. Function Secret Sharing. In: EUROCRYPT 2015, Part II . Vol. 9057. LNCS. Springer, Heidelberg, 2015, pp. 337–367.
 E. Boyle, N. Gilboa, and Y. Ishai. Function Secret Sharing: Improvements and Extensions. In: ACM CCS 16 . ACM Press, 2016, pp. 1292–1303.
 C. Cachin, S. Micali, and M. Stadler. Computationally Private Information Retrieval with Polylogarithmic Communication. In: EUROCRYPT’99 . Vol. 1592. LNCS. Springer, Heidelberg, 1999, pp. 402–414.
 G. S. Cetin et al. Private Queries on Encrypted Genomic Data. In: IACR Cryptology ePrint