Abstract is missing.
- Software Security - The Dangers of AbstractionDieter Gollmann. 1-12 [doi]
- History of PrivacyJan Holvast. 13-42 [doi]
- Applied Ethics and eHealth: Principles, Identity, and RFIDDiane Whitehouse, Penny Duquenoy. 43-55 [doi]
- Identity Management Systems in Healthcare: The Issue of Patient IdentifiersEls Soenens. 56-66 [doi]
- A Survey on Transparency Tools for Enhancing PrivacyHans Hedbom. 67-82 [doi]
- When Spiders Bite: The Use, Misuse, and Unintended Consequences of "Silent Information"Thomas P. Keenan. 83-91 [doi]
- Data Retention and Anonymity Services - Introducing a New Class of Realistic Adversary ModelsStefan Berthold, Rainer Böhme, Stefan Köpsell. 92-106 [doi]
- A Survey on Non-transferable Anonymous CredentialsSebastian Pape. 107-118 [doi]
- Security of Wireless CommunicationDan Cvrcek. 119-134 [doi]
- Enhancing Multilateral Security in and by Reputation SystemsSandra Steinbrecher. 135-150 [doi]
- An Overview of Electronic Passport Security FeaturesZdenek Ríha. 151-159 [doi]
- Location Privacy Issues in Wireless Sensor NetworksJirí Kur, Andriy Stetsko. 160-169 [doi]
- Design and Analysis of a Practical E-Voting ProtocolMarián Novotný. 170-183 [doi]
- Comparing Identity Management Frameworks in a Business ContextJaap-Henk Hoepman, Rieks Joosten, Johanneke Siljee. 184-196 [doi]
- Security Policy Satisfiability and Failure Resilience in WorkflowsMeghna Lowalekar, Ritesh Kumar Tiwari, Kamalakar Karlapalem. 197-210 [doi]
- User Control Problems and Taking User Empowerment FurtherRowena Rodrigues. 211-225 [doi]
- Privacy Awareness: A Means to Solve the Privacy Paradox?Stefanie Pötzsch. 226-236 [doi]
- Testing Privacy AwarenessMike Bergmann. 237-253 [doi]
- The Relationship between Data Protection Legislation and Information Security Related StandardsMartin Meints. 254-267 [doi]
- Investigating Anonymity in Group Based Anonymous AuthenticationDaniel Slamanig, Christian Stingl. 268-281 [doi]