Abstract is missing.
- Soft blocking: flexible blocker tags on the cheapAri Juels, John G. Brainard. 1-7 [doi]
- Privacy preserving route planningKeith B. Frikken, Mikhail J. Atallah. 8-15 [doi]
- Privacy management for portable recording devicesJ. Alex Halderman, Brent R. Waters, Edward W. Felten. 16-24 [doi]
- Modeling privacy values with experimental economicsJulia Brande Earp, J. C. Poindexter, David L. Baumer. 25 [doi]
- Hidden access control policies with hidden credentialsKeith B. Frikken, Mikhail J. Atallah, Jiangtao Li. 27 [doi]
- A quantitative and qualitative ANALYSIS of blocking in association rule hidingEmmanuel D. Pontikakis, Yannis Theodoridis, Achilleas A. Tsitsonis, LiWu Chang, Vassilios S. Verykios. 29-30 [doi]
- A generic approach for healthcare data anonymizationAnas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier. 31-32 [doi]
- Privacy issues in an electronic voting machineArthur M. Keller, David Mertz, Joseph Lorenzo Hall, Arnold Urken. 33-34 [doi]
- Specifying privacy policies with P3P and EPAL: lessons learnedWilliam H. Stufflebeam, Annie I. Antón, Qingfeng He, Neha Jain. 35 [doi]
- Will your digital butlers betray you?Frank Stajano. 37-38 [doi]
- Defending email communication against profiling attacksPhilippe Golle, Ayman Farahat. 39-40 [doi]
- Radio frequency Id and privacy with information goodsNathan Good, David Molnar, Jennifer M. Urban, Deirdre K. Mulligan, Elizabeth Miles, Laura Quilter, David Wagner. 41-42 [doi]
- An identifiability-based access control model for privacy protection in open systemsKeith Irwin, Ting Yu. 43 [doi]
- Conflict and combination in privacy policy languagesAdam Barth, John C. Mitchell, Justin Rosenstein. 45-46 [doi]
- How to achieve blocking resistance for existing systems enabling anonymous web surfingStefan Köpsell, Ulf Hillig. 47-58 [doi]
- Minx: a simple and efficient anonymous packet formatGeorge Danezis, Ben Laurie. 59-65 [doi]
- Location diversity in anonymity networksNick Feamster, Roger Dingledine. 66-76 [doi]
- Off-the-record communication, or, why not to use PGPNikita Borisov, Ian Goldberg, Eric A. Brewer. 77-84 [doi]
- Assessing global disclosure risk in masked microdataTraian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones. 85-93 [doi]
- Privacy-preserving data linkage protocolsChristine M. O Keefe, Ming Yung, Lifang Gu, Rohan A. Baxter. 94-102 [doi]
- Private collaborative forecasting and benchmarkingMikhail J. Atallah, Marina Bykova, Jiangtao Li, Keith B. Frikken, Mercan Topkara. 103-114 [doi]