Abstract is missing.
- Attacking Unlinkability: The Importance of ContextMatthias Franz, Bernd Meyer, Andreas Pashalidis. 1-16 [doi]
- A Fresh Look at the Generalised Mix FrameworkAndrei Serjantov. 17-29 [doi]
- Two-Sided Statistical Disclosure AttackGeorge Danezis, Claudia Díaz, Carmela Troncoso. 30-44 [doi]
- A Family of Dunces: Trivial RFID Identification and Authentication ProtocolsGene Tsudik. 45-61 [doi]
- Louis, Lester and Pierre: Three Protocols for Location PrivacyGe Zhong, Ian Goldberg, Urs Hengartner. 62-76 [doi]
- Efficient Oblivious Augmented Maps: Location-Based Services with a Payment BrokerMarkulf Kohlweiss, Sebastian Faust, Lothar Fritsch, Bartek Gedrojc, Bart Preneel. 77-94 [doi]
- Pairing-Based Onion RoutingAniket Kate, Gregory M. Zaverucha, Ian Goldberg. 95-112 [doi]
- Nymble: Anonymous IP-Address BlockingPeter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith. 113-133 [doi]
- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden ServicesLasse Øverlier, Paul F. Syverson. 134-152 [doi]
- Identity Trail: Covert Surveillance Using DNSSaikat Guha, Paul Francis. 153-166 [doi]
- Sampled Traffic Analysis by Internet-Exchange-Level AdversariesSteven J. Murdoch, Piotr Zielinski. 167-183 [doi]
- Browser-Based Attacks on TorTimothy G. Abbott, Katherine J. Lai, Michael R. Lieberman, Eric C. Price. 184-199 [doi]
- Enforcing P3P Policies Using a Digital Rights Management SystemFarzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini. 200-217 [doi]
- Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal DataMatthias Schunter, Michael Waidner. 218-232 [doi]
- Performance Comparison of Low-Latency Anonymisation Services from a User PerspectiveRolf Wendolsky, Dominik Herrmann, Hannes Federrath. 233-253 [doi]
- Anonymity in the Wild: Mixes on Unstructured NetworksShishir Nagaraja. 254-271 [doi]