Abstract is missing.
- The effects of introspection on creating privacy policyStephanie Trudeau, Sara Sinclair, Sean W. Smith. 1-10 [doi]
- Key allocation schemes for private social networksKeith B. Frikken, Preethi Srinivas. 11-20 [doi]
- A distortion-based metric for location privacyReza Shokri, Julien Freudiger, Murtuza Jadliwala, Jean-Pierre Hubaux. 21-30 [doi]
- On the risks of serving whenever you surf: vulnerabilities in Tor s blocking resistance designJon McLachlan, Nicholas Hopper. 31-40 [doi]
- XPay: practical anonymous payments for tor routing and other networked servicesYao Chen, Radu Sion, Bogdan Carbunar. 41-50 [doi]
- PSP: private and secure payment with RFIDErik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe. 51-60 [doi]
- A verifiable, centralized, coercion-free reputation systemFlorian Kerschbaum. 61-70 [doi]
- Hashing it out in public: common failure modes of DHT-based anonymity schemesAndrew Tran, Nicholas Hopper, Yongdae Kim. 71-80 [doi]
- Longest common subsequence as private searchMark Gondree, Payman Mohassel. 81-90 [doi]
- Redactable signatures on data with dependencies and their application to personal health recordsDavid Bauer, Douglas M. Blough, Apurva Mohan. 91-100 [doi]
- A Greek (privacy) tragedy: the introduction of social security numbers in GreeceEleni Gessiou, Alexandros Labrinidis, Sotiris Ioannidis. 101-104 [doi]
- Faking contextual data for fun, profit, and privacyRichard Chow, Philippe Golle. 105-108 [doi]
- Plinko: polling with a physical implementation of a noisy channelChris Alexander, Joel Reardon, Ian Goldberg. 109-112 [doi]
- Enforcing purpose of use via workflowsMohammad Jafari, Reihaneh Safavi-Naini, Nicholas Paul Sheppard. 113-116 [doi]
- Hiccups on the road to privacy-preserving linear programmingAlice Bednarz, Nigel Bean, Matthew Roughan. 117-120 [doi]