Abstract is missing.
- Quantifying Privacy ViolationsMishtu Banerjee, Rosa Karimi Adl, Leanne Wu, Ken Barker. 1-17 [doi]
- On-the-Fly Generalization Hierarchies for Numerical Attributes RevisitedAlina Campan, Nicholas Cooper, Traian Marius Truta. 18-32 [doi]
- LORA: Link Obfuscation by Randomization in GraphsQian Xiao, Zhengkui Wang, Kian-Lee Tan. 33-51 [doi]
- A Comprehensive Framework for Secure Query Processing on Relational Data in the CloudShiyuan Wang, Divyakant Agrawal, Amr El Abbadi. 52-69 [doi]
- Challenges in Secure Sensor-Cloud ComputingNayot Poolsappasit, Vimal Kumar, Sanjay Madria, Sriram Chellappan. 70-84 [doi]
- SensorSafe: A Framework for Privacy-Preserving Management of Personal Sensory InformationHaksoo Choi, Supriyo Chakraborty, Zainul Charbiwala, Mani B. Srivastava. 85-100 [doi]
- Watermarking for Adaptive Streaming ProtocolsDmitri Jarnikov, Jeroen Doumen. 101-113 [doi]
- Conjunctive Wildcard Search over Encrypted DataChristoph Bösch, Richard Brinkman, Pieter H. Hartel, Willem Jonker. 114-127 [doi]
- Adjusting the Trade-Off between Privacy Guarantees and Computational Cost in Secure Hardware PIRSpiridon Bakiras, Konstantinos F. Nikolopoulos. 128-144 [doi]
- Purpose Control: Did You Process the Data for the Intended Purpose?Milan Petkovic, Davide Prandi, Nicola Zannone. 145-168 [doi]