Abstract is missing.
- Quantifying and Measuring AnonymitySteven J. Murdoch. 3-13 [doi]
- Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-PhonesJan Hajny, Lukas Malina, Zdenek Martinasek, Ondrej Tethal. 17-33 [doi]
- Practical Packing Method in Somewhat Homomorphic EncryptionMasaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba. 34-50 [doi]
- Collaborative and Privacy-Aware Sensing for Observing Urban Movement PatternsNelson Gonçalves, Rui José, Carlos Baquero. 51-65 [doi]
- Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest SettingMauro Barni, Massimo Bernaschi, Riccardo Lazzeretti, Tommaso Pignata, Alessandro Sabellico. 66-82 [doi]
- Privacy Analysis of a Hidden Friendship ProtocolFlorian Kammüller, Sören Preibusch. 83-99 [doi]
- Anonymous and Transferable Electronic Ticketing SchemeArnau Vives-Guasch, Magdalena Payeras-Capellà, Macià Mut Puigserver, Jordi Castellà-Roca, Josep Lluís Ferrer-Gomila. 100-113 [doi]
- Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed ModelGiovanni Di Crescenzo, Brian A. Coan, John Schultz, Simon Tsang, Rebecca N. Wright. 114-132 [doi]
- Privacy-Preserving Processing of Raw Genomic DataErman Ayday, Jean Louis Raisaro, Urs Hengartner, Adam Molyneaux, Jean-Pierre Hubaux. 133-147 [doi]
- Using Search Results to Microaggregate Query Logs SemanticallyArnau Erola, Jordi Castellà-Roca. 148-161 [doi]
- Legal Issues About Metadata Data Privacy vs Information SecurityManuel Munier, Vincent Lalanne, Pierre-Yves Ardoy, Magali Ricarde. 162-177 [doi]
- Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious ModelGeorg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel. 178-193 [doi]
- Differentially Private Smart Metering with Battery RechargingMichael Backes, Sebastian Meiser. 194-212 [doi]
- AppGuard - Fine-Grained Policy Enforcement for Untrusted Android ApplicationsMichael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky. 213-231 [doi]
- Reference Monitors for Security and Interoperability in OAuth 2.0Ronan-Alexandre Cherrueau, Rémi Douence, Jean-Claude Royer, Mario Südholt, Anderson Santana de Oliveira, Yves Roudier, Matteo Dell'Amico. 235-249 [doi]
- Remote Biometrics for Robust Persistent AuthenticationMads I. Ingwar, Christian Damsgaard Jensen. 250-267 [doi]
- Classifying Android Malware through Subgraph MiningFabio Martinelli, Andrea Saracino, Daniele Sgandurra. 268-283 [doi]
- Introducing Probabilities in Contract-Based Approaches for Mobile Application SecurityGianluca Dini, Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra. 284-299 [doi]
- Advanced Detection Tool for PDF ThreatsQuentin Jérome, Samuel Marchal, Radu State, Thomas Engel. 300-315 [doi]
- Enforcing Input Validation through Aspect Oriented ProgrammingGabriel Serme, Theodoor Scholte, Anderson Santana de Oliveira. 316-332 [doi]
- Lightweight Cryptography for Embedded Systems - A Comparative AnalysisCharalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Konstantinos Rantos. 333-349 [doi]
- A Simulation of Document Detection Methods and Reducing False Positives for Private Stream SearchingMichael Oehler, Dhananjay S. Phatak. 353-361 [doi]
- Dynamic Anonymous Index for Confidential DataGuillermo Navarro-Arribas, Daniel Abril, Vicenç Torra. 362-368 [doi]
- Are On-Line Personae Really Unlinkable?Meilof Veeningen, Antonio Piepoli, Nicola Zannone. 369-379 [doi]
- On the Privacy of Private Browsing - A Forensic ApproachKiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini. 380-389 [doi]
- Privacy-Preserving Trust Management Mechanisms from Private Matching SchemesOriol Farràs, Josep Domingo-Ferrer, Alberto Blanco-Justicia. 390-398 [doi]