Abstract is missing.
- Privacy for Public TransportationThomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu. 1-19 [doi]
- Ignoring the Great Firewall of ChinaRichard Clayton, Steven J. Murdoch, Robert N. M. Watson. 20-35 [doi]
- Imagined Communities: Awareness, Information Sharing, and Privacy on the FacebookAlessandro Acquisti, Ralph Gross. 36-58 [doi]
- Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services FrameworksMansour Alsaleh, Carlisle Adams. 59-77 [doi]
- Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity ManagementAnna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino. 78-98 [doi]
- Privacy Injector - Automated Privacy Enforcement Through AspectsChris Vanden Berghe, Matthias Schunter. 99-117 [doi]
- A Systemic Approach to Automate Privacy Policy Enforcement in EnterprisesMarco Casassa Mont, Robert Thyne. 118-134 [doi]
- One Big File Is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization TechniqueSimson L. Garfinkel, David J. Malan. 135-151 [doi]
- Protecting Privacy with the MPEG-21 IPMP FrameworkNicholas Paul Sheppard, Reihaneh Safavi-Naini. 152-171 [doi]
- Personal Rights Management - Taming Camera-Phones for Individual Privacy EnforcementMina Deng, Lothar Fritsch, Klaus Kursawe. 172-189 [doi]
- Improving Sender Anonymity in a Structured Overlay with Imprecise RoutingGiuseppe Ciaccio. 190-207 [doi]
- Selectively Traceable AnonymityLuis von Ahn, Andrew Bortz, Nicholas J. Hopper, Kevin O Neill. 208-222 [doi]
- Valet Services: Improving Hidden Servers with a Personal TouchLasse Øverlier, Paul F. Syverson. 223-244 [doi]
- Blending Different Latency Traffic with Alpha-mixingRoger Dingledine, Andrei Serjantov, Paul F. Syverson. 245-257 [doi]
- Private Resource PairingJoseph A. Calandrino, Alfred C. Weaver. 258-276 [doi]
- Honest-Verifier Private Disjointness Testing Without Random OraclesSusan Hohenberger, Stephen A. Weis. 277-294 [doi]
- A Flexible Framework for Secret HandshakesGene Tsudik, Shouhuai Xu. 295-315 [doi]
- On the Security of the Tor Authentication ProtocolIan Goldberg. 316-331 [doi]
- Optimal Key-Trees for Tree-Based Private AuthenticationLevente Buttyán, Tamás Holczer, István Vajda. 332-350 [doi]
- Simple and Flexible Revocation Checking with PrivacyJohn Solis, Gene Tsudik. 351-367 [doi]
- Breaking the Collusion Detection Mechanism of MorphMixParisa Tabriz, Nikita Borisov. 368-383 [doi]
- Linking Anonymous Transactions: The Consistent View AttackAndreas Pashalidis, Bernd Meyer. 384-392 [doi]
- Preserving User Location Privacy in Mobile Data Management InfrastructuresReynold Cheng, Yu Zhang, Elisa Bertino, Sunil Prabhakar. 393-412 [doi]
- The Effects of Location Access Behavior on Re-identification Risk in a Distributed EnvironmentBradley Malin, Edoardo Airoldi. 413-429 [doi]