Abstract is missing.
- InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocolPer A. Hallgren, Martín Ochoa, Andrei Sabelfeld. 1-6 [doi]
- Recommendation of categories in an agents world: The role of (not) local communicative environmentsRino Falcone, Alessandro Sapienza, Cristiano Castelfranchi. 7-13 [doi]
- Zipf distribution model for quantifying risk of re-identification from trajectory dataHiroaki Kikuchi, Katsumi Takahashi. 14-21 [doi]
- Who manages the manager? Identity management and user ownership in the age of dataJonas Breuer, Heritiana Ranaivoson, Uschi Buchinger, Pieter Ballon. 22-27 [doi]
- Disclosure risk assessment via record linkage by a maximum-knowledge attackerJosep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas. 28-35 [doi]
- Privacy preserving business process matchingDilian Gurov, Peeter Laud, Roberto Guanciale. 36-43 [doi]
- Privacy-preserving conditional random selectionStefan Wuller, Ulrike Meyer, Fabian Forg, Susanne Wetzel. 44-53 [doi]
- Laplace noise generation for two-party computational differential privacyBalamurugan Anandan, Chris Clifton. 54-61 [doi]
- A framework for a privacy-aware feature selection evaluation measureYasser Jafer, Stan Matwin, Marina Sokolova. 62-69 [doi]
- An adaptive algorithm for multivariate data-oriented microaggregationBalkis Abidi, Sadok Ben Yahia. 70-76 [doi]
- Is privacy a human right? An empirical examination in a global contextHsiao-Ying Huang, Masooda Bashir. 77-84 [doi]
- Towards automatic real time identification of malicious posts on FacebookPrateek Dewan, Ponnurangam Kumaraguru. 85-92 [doi]
- What they do in shadows: Twitter underground follower marketAnupama Aggarwal, Ponnurangam Kumaraguru. 93-100 [doi]
- Revealing the relationship network behind link spamApostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz. 101-108 [doi]
- A secure revocable personal health record system with policy-based fine-grained access controlMitu Kumar Debnath, Saeed Samet, Krishnamurthy Vidyasankar. 109-116 [doi]
- An efficient ID-based message recoverable privacy-preserving auditing schemeMehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol. 117-124 [doi]
- An access control model for protecting provenance graphsLiang Chen, Peter Edwards, John D. Nelson, Timothy J. Norman. 125-132 [doi]
- ECA rules for controlling authorisation plan to satisfy dynamic constraintsMeriam Jemel, Nadia Ben Azzouna, Khaled Ghédira. 133-138 [doi]
- Devil in a box: Installing backdoors in electronic door locksSeongyeol Oh, Joon-Sung Yang, Andrea Bianchi, Hyoungshick Kim. 139-144 [doi]
- Embedded systems security: Threats, vulnerabilities, and attack taxonomyDorottya Papp, Zhendong Ma, Levente Buttyán. 145-152 [doi]
- Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devicesTiago V. de Arruda, Yeda R. Venturini, Tiemi C. Sakata. 153-156 [doi]
- Real-time signature-based detection approach for SMS botnetAbdullah J. Alzahrani, Ali A. Ghorbani. 157-164 [doi]
- Network security supported by argumentsFabio Martinelli, Francesco Santini, Artsiom Yautsiukhin. 165-172 [doi]
- Keyboard or keylogger?: A security analysis of third-party keyboards on AndroidJunsung Cho, Geumhwan Cho, Hyoungshick Kim. 173-176 [doi]
- A model for calculating user-identity trustworthiness in online transactionsBrian A. Soeder, K. Suzanne Barber. 177-185 [doi]
- Physical trust-based persistent authenticationMasahiro Fujita, Christian D. Jensen, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki. 186-190 [doi]
- Minimizing transitive trust threats in software management systemsJaap Boender, Giuseppe Primiero, Franco Raimondi. 191-198 [doi]