Abstract is missing.
- FlyByNight: mitigating the privacy risks of social networkingMatthew M. Lucas, Nikita Borisov. 1-8 [doi]
- Privacy-preserving social network analysis for criminal investigationsFlorian Kerschbaum, Andreas Schaad. 9-14 [doi]
- Forensic genomics: kin privacy, driftnets and other open questionsFrank Stajano, Lucia Bianchi, Pietro Liò, Douwe Korff. 15-22 [doi]
- Identification via location-profiling in GSM networksYoni De Mulder, George Danezis, Lejla Batina, Bart Preneel. 23-32 [doi]
- Toward a distributed k-anonymity protocol for location privacyGe Zhong, Urs Hengartner. 33-38 [doi]
- TwoKind authentication: protecting private information in untrustworthy environmentsKatelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith. 39-44 [doi]
- A user study of the expandable grid applied to P3P privacy policy visualizationRobert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor. 45-54 [doi]
- CPG: closed pseudonymous groupsReed S. Abbott, Timothy W. van der Horst, Kent E. Seamons. 55-64 [doi]
- Protecting privacy with protocol stack virtualizationJanne Lindqvist, Juha-Matti Tapio. 65-74 [doi]
- Preserving confidentiality of security policies in data outsourcingSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati. 75-84 [doi]
- Avoiding information leakage in security-policy-aware planningKeith Irwin, Ting Yu, William H. Winsborough. 85-94 [doi]
- Secure aggregation in a publish-subscribe systemKazuhiro Minami, Adam J. Lee, Marianne Winslett, Nikita Borisov. 95-104 [doi]
- Measuring unlinkability revisitedLars Fischer, Stefan Katzenbeisser, Claudia Eckert. 105-110 [doi]
- Revisiting a combinatorial approach toward measuring anonymityBenedikt Gierlichs, Carmela Troncoso, Claudia Díaz, Bart Preneel, Ingrid Verbauwhede. 111-116 [doi]
- Yet another privacy metric for publishing micro-dataKeith B. Frikken, Yihua Zhang. 117-122 [doi]