S. Yuan, A. Z. Abidin, M. Sloan, and J. Wang, Internet advertising: An interplay among advertisers, online publishers, ad exchanges and web users, 2012.

. Adage, Affinicast unveils personalization tool, 1996.

C. Emert, Web advertisers get new tool, 1998.

H. Beales, The value of behavioral targeting, 2009.

J. Yan, N. Liu, G. Wang, W. Zhang, Y. Jiang et al., How much can behavioral targeting help online advertising?, Proceedings of the 18th international conference on World wide web, WWW '09, 2009.
DOI : 10.1145/1526709.1526745

W. Price, Investment insights, 2012.

J. Newman, Kerry-mccain privacy bill: What you need to know, 2011.

E. Lee, Sen. rockefeller: Get ready for a real do-not-track bill for online advertising http://adage.com/article/digital/ sen-rockefeller-ready-a-real-track-bill, 2011.

R. Reitman, The daa's self-regulatory principles fall far short of do not track daa-self-regulation-principles-fall-far-short-do-not-track, 2011.

J. Mayer, A brief overview of the supplementary daa principles, 2011.

R. Gellman and P. Dixon, Many failures: A brief history of privacy self-regulation in the united states, 2011.

J. R. Mayer and J. C. Mitchell, Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.47

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.5781

P. G. Leon, B. Ur, R. Balebako, L. F. Cranor, R. Shay et al., Why Johnny can't opt out, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, 2012.
DOI : 10.1145/2207676.2207759

J. Mayer and A. Narayanan, Do not track: Implementations, 2014.

J. A. Fairfield, Do-not-track as default, Nw. J. Tech. & Intell. Prop, vol.11, issue.2, p.575, 2013.

L. F. Cranor, If you choose not to decide, your web browser will make your choice, 2012.

B. Szoka, The Paradox of Privacy Empowerment: The Unintended Consequences of 'Do Not Track', W3C Workshop: Do Not Track and Beyond, 2012.
DOI : 10.2139/ssrn.2318146

E. Gmbh, Adblockplus -surf the web without annoying ads!

. Disconnect, Disconnect -online privacy & security, 2014.

. Microsoft, Tracking protection list, 2014.

A. Juels, Targeted Advertising ... and Privacy Too, CT-RSA, 2001.
DOI : 10.1007/3-540-45353-9_30

S. Guha, B. Cheng, and P. Francis, Privad: Practical privacy in online advertising, NSDI, 2011.

V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas, Adnostic: Privacy preserving targeted advertising, NDSS, 2010.

M. Backes, A. Kate, M. Maffei, and K. Pecina, ObliviAd: Provably Secure and Practical Online Behavioral Advertising, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.25

A. White, Ip addresses are personal data, e.u. regulator says, 2008.

A. Soltani, S. Canty, Q. Mayo, L. Thomas, and C. J. Hoofnagle, Flash Cookies and Privacy, SSRN Electronic Journal, 2009.
DOI : 10.2139/ssrn.1446862

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.401.7830

S. Kamkar, Evercookie ? never forget, p.2012

T. Vega, New web code draws concern over privacy risks, 2010.

P. Eckersley, How Unique Is Your Web Browser?, PETS, 2010.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264

G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses et al., FPDetective, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516674

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens et al., Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, 2013.
DOI : 10.1109/SP.2013.43

F. Roesner, T. Kohno, D. Wetherallberkeley, C. , U. V. Navalpakkam et al., Detecting and defending against third-party tracking on the web What they know Measurement and modeling of eye-mouse behavior in the presence of nonlinear page layouts, Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, NSDI'12, pp.12-12, 2013.

. Google, Google ads settings

J. Rosen, Who do online advertisers think you are, 2012.

. Bluekai, Bluekai audience data marketplace: Data types, 2014.

. Bluekai, Health and wellness preference data segments, 2014.

]. S. Kroft, The data brokers: Selling your per- sonal informationnews/ the-data-brokers-selling-your-personal-information, 2014.

C. Duhigg, The new york times: How companies learn your secrets, 2012.
DOI : 10.7312/star16075-025

A. Narayanan, There is no such thing as anonymous online tracking, 2011.

B. Krishnamurthy and C. E. Wills, On the leakage of personally identifiable information via online social networks, WOSN, 2009.

B. Krishnamurthy, K. Naryshkin, and C. Wills, Privacy leakage vs. protection measures: the growing disconnect, W2SP, 2011.

J. Valentino-devries, Which websites are sharing your per- sonal details, 2012.

. Adexchanger, Ebay pulls the plug on intent data reseller strategy, 2011.

L. Olejnik, C. Castelluccia, and A. Janc, Why johnny can't browse in peace: On the uniqueness of web browsing history patterns, 5th Workshop on Hot Topics in Privacy Enhancing Technologies, p.2012, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00747841

D. Perito, C. Castelluccia, M. A. Kaafar, and P. Manils, How Unique and Traceable Are Usernames?, PETS, 2011.
DOI : 10.1007/978-3-642-22263-4_1

URL : https://hal.archives-ouvertes.fr/hal-00747495

A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.33

B. Schneier, The eternal value of privacy http://archive.wired.com/ politics/security/commentary/securitymatters, p.5, 2006.

G. R. Stone, Freedom and responsibility, 2006.

D. J. Solove, 'i've got nothing to hide' and other misunderstandings of privacy, San Diego Law Review, vol.44, p.745, 2007.

S. Warren and L. Brandeis, The Right to Privacy, Harvard Law Review, vol.4, issue.5, 1890.
DOI : 10.2307/1321160

A. Viseu, A. Clement, and J. Aspinall, Situating Privacy Online, Information, Communication & Society, vol.7, issue.1, pp.92-114, 2004.
DOI : 10.2307/3481326

A. Odlyzko, Privacy, economics, and price discrimination on the internet, ICEC '03, 2003.
DOI : 10.1145/948005.948051

D. Fastenberg, Facebook firings: Top 10 cases and the nlrb's new guidelines facebook-firings-top-ten-cases-and-the-nlrbs-new-guidelines, 2011.

T. Gould, Manager's poor judgment leads to reversal of termination of employee ? for poor judgment http://www.hrmorning.com/ managers-poor-judgment-leads-to-reversal-of-termination-of-employee-for-poor-j, 2013.

D. Kirkpatrick, The Facebook Effect: The Inside Story of the Company That Is Connecting the World, 2011.

E. Pariser, The filter bubble What the internet is hiding from you, 2011.

C. Castelluccia and A. Narayanan, Privacy considerations of online behaviour tracking, 2012.

B. Krishnamurthy and C. E. Wills, Privacy diffusion on the web, Proceedings of the 18th international conference on World wide web, WWW '09, pp.541-550, 2009.
DOI : 10.1145/1526709.1526782

A. Chaabane, M. A. Kaafar, and R. Boreli, Big friend is watching you, Proceedings of the 2012 ACM workshop on Workshop on online social networks, WOSN '12, 2012.
DOI : 10.1145/2342549.2342552

URL : https://hal.archives-ouvertes.fr/hal-00748155

C. Jensen, C. Sarkar, C. Jensen, and C. Potts, Tracking website data-collection and privacy practices with the iWatch web crawler, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, 2007.
DOI : 10.1145/1280680.1280686

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.518.428

D. Jang, R. Jhala, S. Lerner, and H. Shacham, An empirical study of privacyviolating information flows in javascript web applications, CCS, 2010.

C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell, Protecting browser state from web privacy attacks, Proceedings of the 15th international conference on World Wide Web , WWW '06, 2006.
DOI : 10.1145/1135777.1135884

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.6662

M. Ayenson, D. J. Wambach, A. Soltani, N. Good, and C. J. Hoofnagle, Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning, SSRN Electronic Journal, 2011.
DOI : 10.2139/ssrn.1898390

T. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi, Host fingerprinting and tracking on the web: Privacy and security implications, 19th Annual Network & Distributed System Security Symposium, 2012.

C. Pederick, User agent switcher, 2014.

J. Sullivan, User agent rg, 2014.

A. Reznichenko, S. Guha, and P. Francis, Auctions in do-not-track compliant internet advertising, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011.
DOI : 10.1145/2046707.2046782

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.224.9909

M. Hardt and S. Nath, Privacy-aware personalization for mobile advertising, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382266

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.357.3825

M. Fredrikson and B. Livshits, Repriv: Re-envisioning in-browser privacy, S&P, 2011.
DOI : 10.1109/sp.2011.37

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.8964

I. Hann, K. L. Hui, S. T. Lee, and I. P. Png, Online information privacy: Measuring the cost-benefit trade-off, ICIS, 2002.

G. Danezis, S. Lewis, and R. Anderson, How much is location privacy worth?, WEIS, Citeseer, 2005.

D. Cvrcek, M. Kumpost, V. Matyas, and G. Danezis, A study on the value of location privacy, Proceedings of the 5th ACM workshop on Privacy in electronic society , WPES '06, 2006.
DOI : 10.1145/1179601.1179621

J. P. Carrascal, C. Riederer, V. Erramilli, M. Cherubini, and R. De-oliveira, Your browsing behavior for a big mac, Proceedings of the 22nd international conference on World Wide Web, WWW '13, 2011.
DOI : 10.1016/0167-2681(80)90051-7

A. R. Beresford, D. Kübler, and S. Preibusch, Unwillingness to pay for privacy: A field experiment, Economics Letters, vol.117, issue.1, pp.25-27, 2012.
DOI : 10.1016/j.econlet.2012.04.077

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.392.3898

H. Krasnova, T. Hildebrand, and O. Guenther, Investigating the value of privacy in online social networks: conjoint analysis, ICIS, 2009.

C. Bauer, J. Korunovska, and S. Spiekermann, On the value of information -what facebook users are willing to pay, ECIS, 2009.

A. Acquisti, L. John, and G. Loewenstein, What Is Privacy Worth?, The Journal of Legal Studies, vol.42, issue.2, 2009.
DOI : 10.1086/671754

]. J. Gideon, L. Cranor, S. Egelman, and A. Acquisti, Power strips, prophylactics, and privacy, oh my!, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, 2006.
DOI : 10.1145/1143120.1143137

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.9520

J. Grossklags and A. Acquisti, When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information, Workshop on Economics of Information Security, 2007.

B. A. Huberman, E. Adar, and L. R. Fine, Valuating Privacy, IEEE Security and Privacy Magazine, vol.3, issue.5, pp.22-25, 2005.
DOI : 10.1109/MSP.2005.137

A. Acquisti and J. Grossklags, Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.26-33, 2005.
DOI : 10.1109/MSP.2005.22

A. Braunstein, L. Granka, and J. Staddon, Indirect content privacy surveys, Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, 2011.
DOI : 10.1145/2078827.2078847

E. Steel, C. Locke, E. Cadman, and B. Freese, How much is your personal data worth, pp.927-86

K. C. Laudon, Markets and privacy, Communications of the ACM, vol.39, issue.9, p.92, 1996.
DOI : 10.1145/234215.234476

A. Ghosh and A. Roth, Selling privacy at auction, ACM EC, 2011.
DOI : 10.1145/1993574.1993605

URL : http://arxiv.org/abs/1011.1375

C. Riederer, V. Erramilli, A. Chaintreau, B. Krishnamurthy, and P. Rodriguez, For sale : your data, Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets '11, 2011.
DOI : 10.1145/2070562.2070575

J. Valentino-devries, What they know about you, The Wall Street Journal, 2010.

S. Guha, B. Cheng, and P. Francis, Challenges in measuring online advertising systems, Proceedings of the 10th annual conference on Internet measurement, IMC '10, 2010.
DOI : 10.1145/1879141.1879152

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.1603

A. Acquisti and J. Grossklags, Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.26-33, 2005.
DOI : 10.1109/MSP.2005.22

. Google, Google's cookie matching protocol

. Doubleclick, Doubleclick ad exchange real-time bidding protocol

. Pulsepoint, Pulsepoint real-time bidding api

. Pulsepoint, Real-time bidding protocol request examples

. Doubleclick, Real-time bidding protocol request examples

S. Yuan, J. Wang, and X. Zhao, Real-time bidding for online advertising, Proceedings of the Seventh International Workshop on Data Mining for Online Advertising, ADKDD '13, 2013.
DOI : 10.1145/2501040.2501980

. Google, Cpm ads

. Google, Cost-per-click (cpc)

W. Vickrey, COUNTERSPECULATION, AUCTIONS, AND COMPETITIVE SEALED TENDERS, The Journal of Finance, vol.16, issue.1, pp.8-37, 1961.
DOI : 10.1111/j.1540-6261.1961.tb02789.x

. Google, Decrypting price confirmations https://developers.google.com/ ad-exchange/rtb/response-guide/decrypt-price

P. Eckersley, How Unique Is Your Web Browser?, Privacy Enhancing Technologies, pp.1-18, 2010.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264

. Pulsepoint, Private exchange

L. Olejnik, M. Tran, and C. Castelluccia, Selling off Privacy at Auction, Proceedings 2014 Network and Distributed System Security Symposium, 2014.
DOI : 10.14722/ndss.2014.23270

URL : https://hal.archives-ouvertes.fr/hal-00915249

. Yahoo, Ad interest manager

G. Johnson, The Impact of Privacy Policy on the Auction Market for Online Display Advertising, SSRN Electronic Journal
DOI : 10.2139/ssrn.2333193

. Selenium, Selenium -web browser automation

. Facebook, Updates to custom audiences targeting tool

C. Delo, Facebook to partner with acxiom, epsilon to match store purchases with user profiles http://adage.com/article/digital/ facebook-partner-acxiom-epsilon-match-store-purchases-user-profiles, 239967.

C. Castelluccia, M. A. Kaafar, and M. Tran, Betrayed by Your Ads!, PETS, 2012.
DOI : 10.1007/978-3-642-31680-7_1

URL : https://hal.archives-ouvertes.fr/hal-00747823

M. Helft and T. Vega, Retargeting ads follow surfers to other sites, 2011.

. Google, Google: Cookie matching https://developers.google.com/ ad-exchange/rtb/cookie-guide, 2014.

A. Narayanan, Price discrimination is all around you, 2011.

. Adroll, Adroll's ad exchange partners, 2014.

. Criteo, Criteo to provide customers with access to facebook exchange http://www.criteo.com/en/news-and-events/press-releases/ criteo-provide-customers-access-facebook-exchange, 2012.

. Google, Extra! extra! washington post digital goes programmatic, gets premium rates with doubleclick's ad exchange, 2013.

T. E. Gamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol.31, issue.1, pp.469-472, 1985.

C. Castelluccia, E. Mykletun, and G. Tsudik, Efficient aggregation of encrypted data in wireless sensor networks, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2005.
DOI : 10.1109/MOBIQUITOUS.2005.25

P. Williams and R. Sion, Single round access privacy on outsourced storage, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382229

S. W. Smith, Outbound authentication for programmable secure coprocessors, ESORICS, 2002.
DOI : 10.1145/782814.782838

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.177.4236

C. Castelluccia, M. A. Kaafar, and M. Tran, Betrayed by Your Ads!, PETS, 2012.
DOI : 10.1007/978-3-642-31680-7_1

URL : https://hal.archives-ouvertes.fr/hal-00747823

. Google, Google ads settings https://www.google.com/settings, 2014.

K. Jang, S. Han, S. Han, S. Moon, and K. Park, Sslshader: Cheap ssl acceleration with commodity processors, NSDI, 2011.

. Amazon, Amazon elastic compute cloud (amazon ec2), 2014.