Abstract is missing.
- An approach for identifying JavaScript-loaded advertisements through static program analysisCaitlin R. Orr, Arun Chauhan, Minaxi Gupta, Christopher J. Frisz, Christopher W. Dunn. 1-12 [doi]
- Understanding what they do with what they knowCraig E. Wills, Can Tatar. 13-18 [doi]
- What do online behavioral advertising privacy disclosures communicate to users?Pedro Giovanni Leon, Justin Cranshaw, Lorrie Faith Cranor, Jim Graves, Manoj Hastak, Blase Ur, Guzi Xu. 19-30 [doi]
- Torchestra: reducing interactive traffic delays over torDeepika Gopal, Nadia Heninger. 31-42 [doi]
- Changing of the guards: a framework for understanding and improving entry guard selection in torTariq Elahi, Kevin S. Bauer, Mashael AlSabah, Roger Dingledine, Ian Goldberg. 43-54 [doi]
- Ace: an efficient key-exchange protocol for onion routingMichael Backes, Aniket Kate, Esfandiar Mohammadi. 55-64 [doi]
- Timed revocation of user data: long expiration times from existing infrastructureSirke Reimann, Markus Dürmuth. 65-74 [doi]
- Secure communication over diverse transports: [short paper]Michael Rogers, Eleanor Saitta. 75-80 [doi]
- Differentially private iterative synchronous consensusZhenqi Huang, Sayan Mitra, Geir E. Dullerud. 81-90 [doi]
- A machine learning solution to assess privacy policy completeness: (short paper)Elisa Costante, Yuanhao Sun, Milan Petkovic, Jerry den Hartog. 91-96 [doi]
- Genodroid: are privacy-preserving genomic tests ready for prime time?Emiliano De Cristofaro, Sky Faber, Paolo Gasti, Gene Tsudik. 97-108 [doi]
- How many eyes are spying on your shared folders?Bingshuang Liu, Zhaoyang Liu, Jianyu Zhang, Tao Wei, Wei Zou. 109-116 [doi]
- Understanding sharing preferences and behavior for mHealth devicesAarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony, David Kotz. 117-128 [doi]
- For human eyes only: security and usability evaluationAndreas Pashalidis, Nikos Mavrogiannopoulos, Xavier Ferrer, Beñat Bermejo Olaizola. 129-140 [doi]