Abstract is missing.
- Nonesuch: a mix network with sender unobservabilityThomas S. Heydt-Benjamin, Andrei Serjantov, Benessa Defend. 1-8 [doi]
- On the effectiveness of ::::k::::;-anonymity against traffic analysis and surveillanceNicholas Hopper, Eugene Y. Vasserman. 9-18 [doi]
- Swing & swap: user-centric approaches towards maximizing location privacyMingyan Li, Krishna Sampigethaya, Leping Huang, Radha Poovendran. 19-28 [doi]
- Scratch & vote: self-contained paper-based cryptographic votingBen Adida, Ronald L. Rivest. 29-40 [doi]
- Scanning electronic documents for personally identifiable informationTuomas Aura, Thomas A. Kuhn, Michael Roe. 41-50 [doi]
- Super-sticky and declassifiable release policies for flexible information dissemination controlSruthi Bandhakavi, Charles C. Zhang, Marianne Winslett. 51-58 [doi]
- Measuring relationship anonymity in mix networksVitaly Shmatikov, Ming-Hsiu Wang. 59-62 [doi]
- Privacy management for secure mobilityJanne Lindqvist, Laura Takkinen. 63-66 [doi]
- Enhancing privacy of federated identity management protocols: anonymous credentials in WS-securityJan Camenisch, Thomas Groß, Dieter Sommer. 67-72 [doi]
- Randomization as a strategy for sellers during price discrimination, and impact on bidders privacySumit Joshi, Yu-An Sun, Poorvi L. Vora. 73-76 [doi]
- Revisiting the uniqueness of simple demographics in the US populationPhilippe Golle. 77-80 [doi]
- Probabilistic privacy analysis of published viewsHui Wang, Laks V. S. Lakshmanan. 81-84 [doi]
- Reasoning about obfuscated private information: who have lied and how to lieXiangdong An, Dawn N. Jutla, Nick Cercone. 85-88 [doi]
- Private social network analysis: how to assemble pieces of a graph privatelyKeith B. Frikken, Philippe Golle. 89-98 [doi]
- A privacy-preserving interdomain audit frameworkAdam J. Lee, Parisa Tabriz, Nikita Borisov. 99-108 [doi]
- A study on the value of location privacyDaniel Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis. 109-118 [doi]