pean Telecommunications Standards Institute. Ver-
sion 1.3.1.
ETSI (2015). ETSI TS 102 657: Lawful Interception
(LI); Retained data handling; Handover interface for
the request and delivery of retained data. Euro-
pean Telecommunications Standards Institute. Ver-
sion 1.17.1.
FIDIS project (2008a). D2.13: Virtual Persons and Identi-
ties. David-Oliver Jaquet-Chiffelle (ed.), Version 1.0,
Available online at http://www.fidis.net/resources/
fidis-deliverables/identity-of-identity/#c2162.
FIDIS project (2008b). D3.8: Study on protocols with
respect to identity and identification — an insight
on network protocols and privacy-aware communi-
cation. Marit Hansen and Ammar Alkassar (ed.),
Version 0.8. Available online at http://www.fidis.net/
resources/fidis-deliverables/hightechid/#c2216.
FIDIS project (2009). D17.4: Trust and Identification in
the Light of Virtual Persons. David-Oliver Jaquet-
Chiffelle and Hans Buitelaar (ed.), Version 1.2. Avail-
able online at http://www.fidis.net/resources/fidis-
deliverables/identity-of-identity/#c2596.
Furnell, S. (2010). Online identity: Giving it all away?
Information Security Technical Report, 15(2):42–46.
Identity Theft and Reconstruction.
Herrmann, D., Gerber, C., Banse, C., and Federrath, H.
(2012). Analyzing characteristic host access patterns
for re-identification of web user sessions. In Infor-
mation Security Technology for Applications, volume
7127 of Lecture Notes in Computer Science, pages
136–154. Springer Berlin Heidelberg, DE.
Jackson, G., Jones, S., Booth, G., Champod, C., and Evett,
I. (2006). The nature of forensic science opinion —
a possible framework to guide thinking and practicce
in investigation and in court proceedings. Science &
Justice, 46(1):33–44.
Jones, A. and Martin, T. (2010). Digital forensics and the
issues of identity. Information Security Technical Re-
port, 15(2):67–71. Identity Theft and Reconstruction.
Karabiyik, U. and Aggarwal, S. (2014). Audit: Auto-
mated disk investigation toolkit. The Journal of Digi-
tal Forensics, Security and Law, 2014(2):129–143.
Kirchler, M., Herrmann, D., Lindemann, J., and Kloft, M.
(2016). Tracked without a trace: Linking sessions
of users by unsupervised learning of patterns in their
DNS traffic. In Proceedings of the 2016 ACM Work-
shop on Artificial Intelligence and Security, AISec
’16, pages 23–34, New York, NY, USA. ACM.
Kohno, T., Broido, A., and Claffy, K. C. (2005). Remote
physical device fingerprinting. IEEE Transactions on
Dependable and Secure Computing, 2(2):93–108.
Laperdrix, P., Bielova, N., Baudry, B., and Avoine, G.
(2020). Browser fingerprinting: A survey. ACM
Trans. Web, 14(2):8:1–8:33.
Narten, T., Draves, R., and Krishnan, S. (2007). Privacy
Extensions for Stateless Address Autoconfiguration in
IPv6. IETF. RFC 4941 (Draft Standard).
Peled, O., Fire, M., Rokach, L., and Elovici, Y. (2013). En-
tity matching in online social networks. In 2013 In-
ternational Conference on Social Computing, pages
339–344.
Pfitzmann, A. and Hansen, M. (2010). A terminol-
ogy for talking about privacy by data minimiza-
tion: Anonymity, unlinkability, undetectability, un-
observability, pseudonymity, and identity manage-
ment. Technical report. Version 0.34, Available
online at https://dud.inf.tu-dresden.de/literatur/Anon
Terminology v0.34.pdf.
Pol
ˇ
c
´
ak, L. (2017). Lawful Interception: Identity Detection.
PhD thesis, Brno University of Technology, Faculty of
Information Technology.
Pol
ˇ
c
´
ak, L. and Frankov
´
a, B. (2015). Clock-skew-based
computer identification: Traps and pitfalls. Journal
of Universal Computer Science, 21(9):1210–1233.
Pol
ˇ
c
´
ak, L., Holkovi
ˇ
c, M., and Matou
ˇ
sek, P. (2014a). Host
Identity Detection in IPv6 Networks. In Communica-
tions in Computer and Information Science. Springer
Berlin Heidelberg, DE.
Pol
ˇ
c
´
ak, L., Hranick
´
y, R., and Mart
´
ınek, T. (2014b). On
identities in modern networks. The Journal of Digital
Forensics, Security and Law, 2014(2):9–22.
Robinson, I., Webber, J., and Eifrem, E. (2015). Graph
Databases. O’Reilly Media, Inc., 1005 Gravenstein
Highway North, Sebastopol, CA, USA. Second Edi-
tion.
Ye Na, Zhao Yinliang, Dong Lili, Bian Genqing, Liu, E.,
and Clapworthy, G. J. (2013). User identification
based on multiple attribute decision making in social
networks. China Communications, 10(12):37–49.
DCNET 2020 - 11th International Conference on Data Communication Networking
52