Abstract is missing.
- Hidden CredentialsJason E. Holt, Robert W. Bradshaw, Kent E. Seamons, Hilarie K. Orman. 1-8 [doi]
- Policy migration for sensitive credentials in trust negotiationTing Yu, Marianne Winslett. 9-20 [doi]
- Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measuresTraian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones. 21-30 [doi]
- Analysis of privacy preserving random perturbation techniques: further explorationsHaimonti Dutta, Hillol Kargupta, Souptik Datta, Krishnamoorthy Sivakumar. 31-38 [doi]
- Secure and private sequence comparisonsMikhail J. Atallah, Florian Kerschbaum, Wenliang Du. 39-44 [doi]
- Privacy preserving electronic surveillanceKeith B. Frikken, Mikhail J. Atallah. 45-52 [doi]
- Leveraging the Multi in secure multi-party computationJaideep Vaidya, Chris Clifton. 53-59 [doi]
- Anonymous credentials with biometrically-enforced non-transferabilityRussell Impagliazzo, Sara Miner More. 60-71 [doi]
- New covert channels in HTTP: adding unwitting Web browsers to anonymity setsMatthias Bauer. 72-78 [doi]
- Covert channels and anonymizing networksIra S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, Allen R. Miller. 79-88 [doi]
- Heartbeat traffic to counter (n-1) attacks: red-green-black mixesGeorge Danezis, Len Sassaman. 89-93 [doi]
- Reusable anonymous return channelsPhilippe Golle, Markus Jakobsson. 94-100 [doi]
- Preserving privacy when preference searching in e-commerceRhys Smith, Jianhua Shao. 101-110 [doi]
- I didn t buy it for myself privacy and ecommerce personalizationLorrie Faith Cranor. 111-117 [doi]
- Privacy preserving database application testingXintao Wu, Yongge Wang, Yuliang Zheng. 118-128 [doi]