Abstract is missing.
- An Efficient and Robust Social Network De-anonymization AttackGábor György Gulyás, Benedek Simon, Sándor Imre. 1-11 [doi]
- Control versus Effort in Privacy Warnings for WebformsKat Krol, Sören Preibusch. 13-23 [doi]
- On Profile Linkability despite Anonymity in Social Media SystemsMichael Backes 0001, Pascal Berrang, Oana Goga, Krishna P. Gummadi, Praveen Manoharan. 25-35 [doi]
- Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting ProtectionPeter Baumann, Stefan Katzenbeisser 0001, Martin Stopczynski, Erik Tews. 37-46 [doi]
- Predicting Mobile App Privacy Preferences with PsychographicsAndrew McNamara, Akash Verma, Jon Stallings, Jessica Staddon. 47-58 [doi]
- Generating Secret Keys from Biometric Body Impedance MeasurementsMarc Roeschlin, Ivo Sluganovic, Ivan Martinovic, Gene Tsudik, Kasper Bonne Rasmussen. 59-69 [doi]
- That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing MechanismsSuphannee Sivakorn, Angelos D. Keromytis, Jason Polakis. 71-81 [doi]
- Detecting Communities under Differential PrivacyHiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch. 83-93 [doi]
- Poisoning the Well: Exploring the Great Firewall's Poisoned DNS ResponsesOliver Farnan, Alexander Darer, Joss Wright. 95-98 [doi]
- CPPL: Compact Privacy Policy LanguageMartin Henze, Jens Hiller, Sascha Schmerling, Jan Henrik Ziegeldorf, Klaus Wehrle. 99-110 [doi]
- Vote to Link: Recovering from Misbehaving Anonymous UsersWouter Lueks, Maarten H. Everts, Jaap-Henk Hoepman. 111-122 [doi]
- Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable ProofsJan Camenisch, Manu Drijvers, Jan Hajny. 123-133 [doi]
- Automatic Assessment of Website Compliance to the European Cookie Law with CooLCheckClaudio Carpineto, Davide Lo Re, Giovanni Romano 0002. 135-138 [doi]
- UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACsMarios Isaakidis, Harry Halpin, George Danezis. 139-142 [doi]
- (The Futility of) Data Privacy in Content-Centric NetworkingCesar Ghali, Gene Tsudik, Christopher A. Wood. 143-152 [doi]
- Elxa: Scalable Privacy-Preserving Plagiarism DetectionNik Unger, Sahithi Thandra, Ian Goldberg. 153-164 [doi]
- ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding BottlenecksJohn Geddes, Mike Schliep, Nicholas Hopper. 165-176 [doi]
- TASP: Towards Anonymity Sets that PersistJamie Hayes, Carmela Troncoso, George Danezis. 177-180 [doi]
- PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous CommunicationLudovic Barman, Mahdi Zamani, Italo Dacosta, Joan Feigenbaum, Bryan Ford, Jean-Pierre Hubaux, David Wolinsky. 181-184 [doi]
- Privacy-Preserving Lawful Contact Chaining: [Preliminary Report]Aaron Segal, Joan Feigenbaum, Bryan Ford. 185-188 [doi]