Abstract is missing.
- Efficient Secure Outsourcing of Genome-Wide Association StudiesWenjie Lu, Yoshiji Yamada, Jun Sakuma. 3-6 [doi]
- Privacy-Preserving Statistical Analysis by Exact Logistic RegressionDavid A. duVerle, Shohei Kawasaki, Yoshiji Yamada, Jun Sakuma, Koji Tsuda. 7-16 [doi]
- Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic ChannelJi Young Chun, Hyelim Lee, Ji Won Yoon. 17-26 [doi]
- Privacy Threats and Practical Solutions for Genetic Risk TestsLudovic Barman, Mohammed Taha Elgraini, Jean Louis Raisaro, Jean-Pierre Hubaux, Erman Ayday. 27-31 [doi]
- Quantifying Genomic Privacy via Inference Attack with High-Order SNV CorrelationsSahel Shariati Samani, Zhicong Huang, Erman Ayday, Mark Elliot, Jacques Fellay, Jean-Pierre Hubaux, Zoltan Kutalik. 32-40 [doi]
- One Size Doesn't Fit All: Measuring Individual Privacy in Aggregate Genomic DataSean Simmons, Bonnie Berger. 41-49 [doi]
- Genomic Privacy Metrics: A Systematic ComparisonIsabel Wagner. 50-59 [doi]
- Genomic Privacy and Direct-to-Consumer Genetics: Big Consumer Genetic Data - What's in that Contract?Andelka M. Phillips. 60-64 [doi]
- Seeking a "Race to the Top" in Genomic Cloud Privacy?Mark Phillips, Bartha M. Knoppers, Yann Joly. 65-69 [doi]
- The Correctness-Security Gap in Compiler OptimizationVijay D'Silva, Mathias Payer, Dawn Xiaodong Song. 73-87 [doi]
- Grammatical Inference and Language Frameworks for LANGSECKerry N. Wood, Richard E. Harang. 88-98 [doi]
- Error-Correcting Codes as Source for Decoding AmbiguityAdrian Dabrowski, Isao Echizen, Edgar R. Weippl. 99-105 [doi]
- Verification State-Space Reduction through Restricted Parsing EnvironmentsJacob I. Torrey, Mark P. Bridgman. 106-116 [doi]
- On the Generality and Convenience of EtypesW. Michael Petullo, Joseph Suh. 117-124 [doi]
- Protocol State Machines and Session Languages: Specification, implementation, and Security FlawsErik Poll, Joeri de Ruiter, Aleksy Schubert. 125-133 [doi]
- Towards More Security in Data Exchange: Defining Unparsers with Context-Sensitive Encoders for Context-Free GrammarsLars Hermerschmidt, Stephan Kugelmann, Bernhard Rumpe. 134-141 [doi]
- Nom, A Byte oriented, streaming, Zero copy, Parser Combinators Library in RustGeoffroy Couprie. 142-148 [doi]
- PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering MethodologyNicolás Notario, Alberto Crespo, Yod-Samuel Martín, José M. del Álamo, Daniel Le Métayer, Thibaud Antignac, Antonio Kung, Inga Kroener, David Wright. 151-158 [doi]
- Protection Goals for Privacy EngineeringMarit Hansen, Meiko Jensen, Martin Rost. 159-166 [doi]
- Privacy by Design in Federated Identity ManagementRainer Hoerbe, Walter Hötzendorfer. 167-174 [doi]
- Extending the Power of Consent with User-Managed Access: A Standard Architecture for Asynchronous, Centralizable, Internet-Scalable ConsentEve Maler. 175-179 [doi]
- Decentralizing Privacy: Using Blockchain to Protect Personal DataGuy Zyskind, Oz Nathan, Alex Pentland. 180-184 [doi]
- Reviewing for Privacy in Internet and Web Standard-SettingNick Doty. 185-192 [doi]
- Privacy Principles for Sharing Cyber Security DataGina Fisk, Calvin Ardi, Neale Pickett, John S. Heidemann, Mike Fisk, Christos Papadopoulos. 193-197 [doi]
- Choose Wisely: A Comparison of Secure Two-Party Computation FrameworksJan Henrik Ziegeldorf, Jan Metzke, Martin Henze, Klaus Wehrle. 198-205 [doi]
- Tor Experimentation ToolsFatemeh Shirazi, Matthias Goehring, Claudia Díaz. 206-213 [doi]