Abstract is missing.
- The pynchon gate: a secure method of pseudonymous mail retrievalLen Sassaman, Bram Cohen, Nick Mathewson. 1-9 [doi]
- Maintaining privacy on derived objectsNicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera. 10-19 [doi]
- Protecting privacy in tabular healthcare data: explicit uncertainty for disclosure controlBrian Shand, Jem Rashbass. 20-26 [doi]
- Disabling RFID tags with visible confirmation: clipped tags are silencedGünter Karjoth, Paul A. Moskowitz. 27-30 [doi]
- Privacy for RFID through trusted computingDavid Molnar, Andrea Soppera, David Wagner. 31-34 [doi]
- Specifying electronic voting protocols in typed MSRTheodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas. 35-39 [doi]
- Anonymous yet accountable access controlMichael Backes, Jan Camenisch, Dieter Sommer. 40-46 [doi]
- Determining user privacy preferences by asking the right questions: an automated approachKeith Irwin, Ting Yu. 47-50 [doi]
- Mining rule semantics to understand legislative complianceTravis D. Breaux, Annie I. Antón. 51-54 [doi]
- Quantitative evaluation of unlinkable ID matching schemesYasunobu Nohara, Sozo Inoue, Kensuke Baba, Hiroto Yasuura. 55-60 [doi]
- Coercion-resistant electronic electionsAri Juels, Dario Catalano, Markus Jakobsson. 61-70 [doi]
- Information revelation and privacy in online social networksRalph Gross, Alessandro Acquisti, H. John Heinz III. 71-80 [doi]
- Secure off-the-record messagingMario Di Raimondo, Rosario Gennaro, Hugo Krawczyk. 81-89 [doi]
- Peripheral privacy notifications for wireless networksBraden Kowitz, Lorrie Faith Cranor. 90-96 [doi]
- The privacy cost of the second-chance offerSumit Joshi, Yu-An Sun, Poorvi L. Vora. 97-106 [doi]