Abstract is missing.
- Betrayed by Your Ads! - Reconstructing User Profiles from Targeted AdsClaude Castelluccia, Mohamed Ali Kâafar, Minh-Dung Tran. 1-17 [doi]
- Private Client-Side Profiling with Random Forests and Hidden Markov ModelsGeorge Danezis, Markulf Kohlweiss, Benjamin Livshits, Alfredo Rial. 18-37 [doi]
- Understanding Statistical Disclosure: A Least Squares ApproachFernando Pérez-González, Carmela Troncoso. 38-57 [doi]
- Website Detection Using Remote Traffic AnalysisXun Gong, Nikita Borisov, Negar Kiyavash, Nabil Schear. 58-78 [doi]
- k-Indistinguishable Traffic Padding in Web ApplicationsWen Ming Liu, Lingyu Wang, Kui Ren, Pengsu Cheng, Mourad Debbabi. 79-99 [doi]
- Spying in the Dark: TCP and Tor Traffic AnalysisYossi Gilad, Amir Herzberg. 100-119 [doi]
- Secure Distributed Framework for Achieving ε-Differential PrivacyDima Alhadidi, Noman Mohammed, Benjamin C. M. Fung, Mourad Debbabi. 120-139 [doi]
- Differentially Private Continual Monitoring of Heavy Hitters from Distributed StreamsT.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu. 140-159 [doi]
- Adaptive Differentially Private Histogram of Low-Dimensional DataChengfang Fang, Ee-Chien Chang. 160-179 [doi]
- PRISM - Privacy-Preserving Search in MapReduceErik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen. 180-200 [doi]
- Practical Privacy Preserving Cloud Resource-Payment for Constrained ClientsMartin Pirker, Daniel Slamanig, Johannes Winter. 201-220 [doi]
- Fault-Tolerant Privacy-Preserving StatisticsMarek Jawurek, Florian Kerschbaum. 221-238 [doi]
- Evading Censorship with Browser-Based ProxiesDavid Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Dan Boneh, Roger Dingledine, Phil Porras. 239-258 [doi]
- Exploring the Ecosystem of Referrer-Anonymizing ServicesNick Nikiforakis, Steven Van Acker, Frank Piessens, Wouter Joosen. 259-278 [doi]
- Risk Communication Design: Video vs. TextVaibhav Garg, L. Jean Camp, Katherine H. Connelly, Lesa Lorenzen-Huber. 279-298 [doi]
- Use Fewer Instances of the Letter "i": Toward Writing Style AnonymizationAndrew W. E. McDonald, Sadia Afroz, Aylin Caliskan, Ariel Stolerman, Rachel Greenstadt. 299-318 [doi]