Abstract is missing.
- How Unique and Traceable Are Usernames?Daniele Perito, Claude Castelluccia, Mohamed Ali Kåafar, Pere Manils. 1-17 [doi]
- Text Classification for Data Loss PreventionMichael Hart, Pratyusa K. Manadhata, Rob Johnson. 18-37 [doi]
- P3CA: Private Anomaly Detection Across ISP NetworksShishir Nagaraja, Virajith Jalaparti, Matthew Caesar, Nikita Borisov. 38-56 [doi]
- Quantifying Location Privacy: The Case of Sporadic Location ExposureReza Shokri, George Theodorakopoulos, George Danezis, Jean-Pierre Hubaux, Jean-Yves Le Boudec. 57-76 [doi]
- Privacy in Mobile Computing for Location-Sharing-Based ServicesIgor Bilogrevic, Murtuza Jadliwala, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad. 77-96 [doi]
- On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?Davide Zanetti, Pascal Sachs, Srdjan Capkun. 97-116 [doi]
- An Accurate System-Wide Anonymity Metric for Probabilistic AttacksRajiv Bagai, Huabo Lu, Rong Li, Bin Tang. 117-133 [doi]
- DefenestraTor: Throwing Out Windows in TorMashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker. 134-154 [doi]
- Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2PMichael Herrmann, Christian Grothoff. 155-174 [doi]
- Privacy-Friendly Aggregation for the Smart-GridKlaus Kursawe, George Danezis, Markulf Kohlweiss. 175-191 [doi]
- Plug-In Privacy for Smart Metering BillingMarek Jawurek, Martin Johns, Florian Kerschbaum. 192-210 [doi]
- Scramble! Your Social Network DataFilipe Beato, Markulf Kohlweiss, Karel Wouters. 211-225 [doi]
- A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record LinkageMehmet Kuzu, Murat Kantarcioglu, Elizabeth Durham, Bradley Malin. 226-245 [doi]
- Efficient Proofs of Attributes in Pairing-Based Anonymous Credential SystemAmang Sudarsono, Toru Nakanishi, Nobuo Funabiki. 246-263 [doi]
- Broker-Based Private MatchingAbdullatif Shikfa, Melek Önen, Refik Molva. 264-284 [doi]