Abstract is missing.
- Privacy Vulnerabilities in Encrypted HTTP StreamsGeorge Dean Bissias, Marc Liberatore, David Jensen, Brian Neil Levine. 1-11 [doi]
- An Analysis of Parallel Mixing with Attacker-Controlled InputsNikita Borisov. 12-25 [doi]
- Message Splitting Against the Partial AdversaryAndrei Serjantov, Steven J. Murdoch. 26-39 [doi]
- Location Privacy for Cellular Systems; Analysis and SolutionGeir M. Køien, Vladimir A. Oleshchuk. 40-58 [doi]
- Towards Modeling Wireless Location PrivacyLeping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki. 59-77 [doi]
- Failures in a Hybrid Content Blocking SystemRichard Clayton. 78-92 [doi]
- Anonymity Preserving Techniques in Trust NegotiationsIndrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini, Elena Ferrari. 93-109 [doi]
- Unmixing Mix TrafficYe Zhu, Riccardo Bettati. 110-127 [doi]
- Mix-Network with Stronger SecurityJan Camenisch, Anton Mityagin. 128-146 [doi]
- Covert Channels in IPv6Norka B. Lucena, Grzegorz Lewandowski, Steve J. Chapin. 147-166 [doi]
- Towards Privacy-Aware eLearningKatrin Borcea, Hilko Donker, Elke Franz, Andreas Pfitzmann, Hagen Wahrig. 167-178 [doi]
- Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed RemediesTønnes Brekne, André Årnes, Arne Øslebø. 179-196 [doi]
- Privacy Issues in Vehicular Ad Hoc NetworksFlorian Dötzer. 197-209 [doi]
- High-Power Proxies for Enhancing RFID Privacy and UtilityAri Juels, Paul F. Syverson, Daniel V. Bailey. 210-226 [doi]
- Integrating Utility into Face De-identificationRalph Gross, Edoardo Airoldi, Bradley Malin, Latanya Sweeney. 227-242 [doi]
- Privacy in India: Attitudes and AwarenessPonnurangam Kumaraguru, Lorrie Faith Cranor. 243-258 [doi]
- Economics of Identity Management: A Supply-Side PerspectiveSven Koble, Rainer Böhme. 259-272 [doi]