Abstract is missing.
- Analyzing PETs for Enterprise OperationsStuart Shapiro, Aaron Powell. 1 [doi]
- Perfect Matching Disclosure AttacksCarmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede. 2-23 [doi]
- An Indistinguishability-Based Characterization of Anonymous ChannelsAlejandro Hevia, Daniele Micciancio. 24-43 [doi]
- On the Impact of Social Network Profiling on AnonymityClaudia Díaz, Carmela Troncoso, Andrei Serjantov. 44-62 [doi]
- Shining Light in Dark Places: Understanding the Tor NetworkDamon McCoy, Kevin S. Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker. 63-76 [doi]
- Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-ProverAaron R. Coble. 77-98 [doi]
- Breaking and Provably Fixing MinxErik Shimshock, Matt Staats, Nick Hopper. 99-114 [doi]
- Metrics for Security and Performance in Low-Latency Anonymity SystemsSteven J. Murdoch, Robert N. M. Watson. 115-132 [doi]
- Studying Timing Analysis on the Internet with SubRosaHatim Daginawala, Matthew Wright. 133-150 [doi]
- Bridging and Fingerprinting: Epistemic Attacks on Route SelectionGeorge Danezis, Paul F. Syverson. 151-166 [doi]
- Chattering LaptopsTuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed. 167-186 [doi]
- How to Bypass Two Anonymity Revocation SchemesGeorge Danezis, Len Sassaman. 187-201 [doi]
- Reputation Systems for Anonymous NetworksElli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin. 202-218 [doi]
- PAR: Payment for Anonymous RoutingElli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin. 219-236 [doi]