Abstract is missing.
- Mitigating Inadvertent Insider Threats with IncentivesDebin Liu, Xiaofeng Wang, L. Jean Camp. 1-16 [doi]
- Deterring Online Advertising Fraud through Optimal Payment in ArrearsBenjamin Edelman. 17-31 [doi]
- Privacy-Preserving Information Markets for Computing Statistical DataAggelos Kiayias, Bülent Yener, Moti Yung. 32-50 [doi]
- Achieving Privacy in a Federated Identity Management SystemSusan Landau, Hubert Lê Van Gông, Robin Wilton. 51-70 [doi]
- Data Hemorrhages in the Health-Care SectorM. Eric Johnson. 71-89 [doi]
- Solving Linear Programs Using Multiparty ComputationTomas Toft. 90-107 [doi]
- Private Intersection of Certified SetsJan Camenisch, Gregory M. Zaverucha. 108-127 [doi]
- Privacy-Preserving Classifier LearningJustin Brickell, Vitaly Shmatikov. 128-147 [doi]
- Investments and Trade-offs in the Economics of Information SecurityChristos Ioannidis, David J. Pym, Julian Williams. 148-166 [doi]
- Blue versus Red: Towards a Model of Distributed Security AttacksNeal Fultz, Jens Grossklags. 167-183 [doi]
- Optimised to Fail: Card Readers for Online BankingSaar Drimer, Steven J. Murdoch, Ross J. Anderson. 184-200 [doi]
- Expecting the Unexpected: Towards Robust Credential InfrastructureShouhuai Xu, Moti Yung. 201-221 [doi]
- Optical DNADeepak Vijaywargi, Dave Lewis, Darko Kirovski. 222-229 [doi]
- Passwords: If We re So Smart, Why Are We Still Using Them?Cormac Herley, Paul C. van Oorschot, Andrew S. Patrick. 230-237 [doi]
- Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity ProtectionZiqing Mao, Ninghui Li, Ian Molloy. 238-255 [doi]
- Evil Searching: Compromise and Recompromise of Internet Hosts for PhishingTyler Moore, Richard Clayton. 256-272 [doi]
- Detecting Denial of Service Attacks in TorNorman Danner, Danny Krizanc, Marc Liberatore. 273-284 [doi]
- Cryptographic Combinatorial Securities ExchangesChristopher Thorpe, David C. Parkes. 285-304 [doi]
- Cryptographic Combinatorial Clock-Proxy AuctionsDavid C. Parkes, Michael O. Rabin, Christopher Thorpe. 305-324 [doi]
- Secure Multiparty Computation Goes LivePeter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas P. Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael I. Schwartzbach, Tomas Toft. 325-343 [doi]
- Coercion Resistant End-to-end VotingRyan W. Gardner, Sujata Garera, Aviel D. Rubin. 344-361 [doi]
- Relations Among Privacy NotionsJens-Matthias Bohli, Andreas Pashalidis. 362-380 [doi]