Christoph Bösch, Benjamin Erb, Frank Kargl, Henning Kopp and Stefan Pfattheicher
 G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, “The Web never forgets: Persistent tracking mechanisms in the wild,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014, pp. 674-689.
 A. Acquisti, “Privacy in electronic commerce and the economics of immediate gratification,” in Proceedings of the 5th ACM conference on Electronic commerce. ACM, 2004, pp. 21-29.
 -, “Nudging privacy: The behavioral economics of personal
 J. M. Abowd and I. Schmutte. Revisiting the economics of privacy: Population statistics and confidentiality protection as public goods. Document 22, Labor Dynamics Institute, Jan. 2015.
 J. Brodkin. At&t offers gigabit internet discount in exchange for your web history. arstechnica.com/information-technology/2013/12/att-offers-gigabit-internet-discount-in-exchange-for-your-web-history/, Posted: 12/11/2013.
 Y. Chen, S. Chong, I. A. Kash, T. Moran, and S. Vadhan. Truthful mechanisms for agents that value privacy. In
Yao Li, Alfred Kobsa, Bart P. Knijnenburg and M-H. Carolyn Nguyen
 A. Acquisti and J. Grossklags. Privacy Attitudes and Privacy Behavior. In L. Camp and S. Lewis, editors, Economics of Information Security , volume 12 of Advances in Information Security , pages 165–178. Springer US, 2004.
 I. Ajzen. The theory of planned behavior. Organizational Behavior and Human Decision Processes , 50(2):179–211, 1991.
 I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? Journal of Social Issues , 33(3):66–84, July 1977.
 A. Anton, J. Earp, and J. Young. How internet
David M. Sommer, Sebastian Meiser and Esfandiar Mohammadi
 “CoverUp Measurement Data,” http://e.mohammadi.eu/paper/coverup_measurements.zip , 2018, [Online].
 M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep Learning with Differential Privacy,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS) . ACM, 2016, pp. 308–318.
 M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1st ed. New York: Dover, 1972.
 B. Balle, G. Barthe
Konstantinos Chatzikokolakis, Catuscia Palamidessi and Marco Stronati
1 This work was partially supported by the European Union 7th FP project MEALS, by the project ANR-12-IS02-001 PACE, and by the INRIA Large Scale Initiative CAPPRIS.
 https://github.com/paracetamolo/elastic-mechanism .
 M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: differential privacy for location-based systems. In Proc. of CCS , pages 901–914. ACM, 2013.
 C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati. Location privacy protection
Paul Schmitt, Anne Edmundson, Allison Mankin and Nick Feamster
4033, March 2005. http://www.rfc-editor.org/rfc/rfc4033.txt .
 B ernstein , D. J. Curve25519: New Diffie-Hellman speed records. In Public Key Cryptography - PKC 2006 (Berlin, Heidelberg, 2006).
 B ernstein , D. J. DNSCurve: Usable security for DNS. https://dnscurve.org , 2009.
 B ortzmeyer , S. DNS query name minimisation to improve privacy. RFC 7816, March 2016.
 C alder , M., F lavel , A., K atz -B assett , E., M ahajan , R., and P adhye , J. Analyzing the performance of an any-cast cdn. In Proceedings of the 2015 Internet
 A. Agresti. Categorical Data Analysis. Wiley Series in Probability and Statistics. Wiley-Interscience, 2nd edition, 2002.
 Alexa. The top 500 sites on the web. http://www.alexa.com/topsites.
 Jane R Bambauer, Krish Muralidhar, and Rathindra Sarathy. Fool’s gold: an illustrated critique of differential privacy. 2013.
 Raef Bassily and Adam Smith. Local, private, efficient protocols for succinct histograms. In STOC. ACM, June 2015, to appear.
 T-H Hubert
Anh Pham, Italo Dacosta, Bastien Jacot-Guillarmod, Kévin Huguenin, Taha Hajar, Florian Tramèr, Virgil Gligor and Jean-Pierre Hubaux
: May 2016.
 http://www.businessinsider.com/blake-jareds-50000-uber-credit-free-rides-for-life-2014-4 . Last visited: May 2016.
 http://fortune.com/2015/03/30/uber-stolen-account-credentials-alphabay/ . Last visited: May 2016.
 Cryptographic key length recommendation. http://www.keylength.com/en/ . Last visited: May 2016.
 G. Arfaoui, J.-F. Lalande, J. Traoré, N. Desmoulins, P. Berthomé, and S. Gharout. A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. Proc. of the 15th Privacy Enhancing Technologies
Archita Agarwal, Maurice Herlihy, Seny Kamara and Tarik Moataz
 Javallier. https://github.com/snipsco/paillier-librariesbenchmarks/tree/master/java-javallier .
 J. Abowd. The challenge of scientific reproducibility and privacy protection for statistical agencies., 15 September 2016. https://www2.census.gov/cac/sac/meetings/2016-09/2016-abowd.pdf .
 G. Acs and C. Castelluccia. A case study: privacy preserving release of spatio-temporal density in paris. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining , pages 1679–1688. ACM, 2014
Thomas Linden, Rishabh Khandelwal, Hamza Harkous and Kassem Fawaz
 W. F. Adkinson, J. A. Eisenach, and T. M. Lenard, “Privacy online: A report on the information practices and policies of commercial web sites,” Progress and Freedom Foundation , 2002.
 E. AI. [Online]. Available: https://spacy.io/
 A. I. Anton, J. B. Earp, Q. He, W. Stufflebeam, D. Bolchini, and C. Jensen, “Financial privacy policies and the need for standardization,” IEEE Security & privacy , vol. 2, no. 2, pp. 36–45, 2004.
 A. I. Antón, J. B. Earp, and A. Reese, “Analyzing website privacy requirements using a