Abstract is missing.
- Privacy-Enhancing Technologies for the Internet, II: Five Years LaterIan Goldberg. 1-12 [doi]
- Detecting Web Bugs with Bugnosis: Privacy Advocacy through EducationAdil Alsaid, David Martin. 13-26 [doi]
- Private AuthenticationMartín Abadi. 27-40 [doi]
- Towards an Information Theoretic Metric for AnonymityAndrei Serjantov, George Danezis. 41-53 [doi]
- Towards Measuring AnonymityClaudia Díaz, Stefaan Seys, Joris Claessens, Bart Preneel. 54-68 [doi]
- Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer DataGünter Karjoth, Matthias Schunter, Michael Waidner. 69-84 [doi]
- Privacy Enhancing Profile DisclosurePéter Dornbach, Zoltán Németh. 85-98 [doi]
- Privacy Enhancing Service ArchitecturesTero Alamäki, Margareta Björksten, Péter Dornbach, Casper Gripenberg, Norbert Gyorbíró, Gábor Márton, Zoltán Németh, Timo Skyttä, Mikko Tarkiainen. 99-109 [doi]
- Dummy Traffic against Long Term Intersection AttacksOliver Berthold, Heinrich Langos. 110-128 [doi]
- Protecting Privacy during On-Line Trust NegotiationKent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis. 129-143 [doi]
- Prototyping an Armored Data Vault: Rights Management on Big Brother s ComputerAlexander Iliev, Sean W. Smith. 144-159 [doi]
- Preventing Interval-Based Inference by Random Data PerturbationYingjiu Li, Lingyu Wang, Sushil Jajodia. 160-170 [doi]
- Fingerprinting Websites Using Traffic AnalysisAndrew Hintz. 171-178 [doi]
- A Passive Attack on the Privacy of Web Users Using Standard Log InformationThomas Demuth. 179-193 [doi]
- Covert Messaging through TCP TimestampsJohn Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts. 194-208 [doi]
- Almost Optimal Private Information RetrievalDmitri Asonov, Johann Christoph Freytag. 209-223 [doi]
- Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an Alternative to the MIX Based Approach?Dogan Kesdogan, Mark Borning, Michael Schmeink. 224-238 [doi]