Abstract is missing.
- Loose tweets: an analysis of privacy leaks on twitterHuina Mao, Xin Shuai, Apu Kapadia. 1-12 [doi]
- Who clicks there!: anonymising the photographer in a camera saturated societyShishir Nagaraja, Péter Schaffer, Djamila Aouada. 13-22 [doi]
- Protecting against physical resource monitoringGergely Ács, Claude Castelluccia, William Lecat. 23-32 [doi]
- On the limits of privacy in reputation systemsStefan Schiffner, Andreas Pashalidis, Elmar Tischhauser. 33-42 [doi]
- Pythia: a privacy aware, peer-to-peer network for social searchShirin Nilizadeh, Naveed Alam, Nathaniel Husted, Apu Kapadia. 43-48 [doi]
- Privacy-preserving smart meteringAlfredo Rial, George Danezis. 49-60 [doi]
- SPEcTRe: spot-checked private ecash tolling at roadsideJeremy Day, Yizhou Huang, Edward Knapp, Ian Goldberg. 61-68 [doi]
- Private data indexes for selective access to outsourced dataSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 69-80 [doi]
- Non-interactive distributed encryption: a new primitive for revocable privacyJaap-Henk Hoepman, David Galindo. 81-92 [doi]
- BridgeSPA: improving Tor bridges with single packet authorizationRob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner. 93-102 [doi]
- Website fingerprinting in onion routing based anonymization networksAndriy Panchenko, Lukas Niessen, Andreas Zinnen, Thomas Engel. 103-114 [doi]
- SPARC: a security and privacy aware virtual machinecheckpointing mechanismMikhail I. Gofman, Ruiqi Luo, Ping Yang, Kartik Gopalan. 115-124 [doi]
- FAUST: efficient, TTP-free abuse prevention by anonymous whitelistingPeter Lofgren, Nicholas Hopper. 125-130 [doi]
- Privacy-preserving traffic padding in web-based applicationsWen Ming Liu, Lingyu Wang, Pengsu Cheng, Mourad Debbabi. 131-136 [doi]
- Adapt-lite: privacy-aware, secure, and efficient mhealth sensingShrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, David Kotz. 137-142 [doi]
- Cover locations: availing location-based services without revealing the locationSai Teja Peddinti, Avis Dsouza, Nitesh Saxena. 143-152 [doi]
- Private searching for single and conjunctive keywords on streaming dataXun Yi, Elisa Bertino. 153-158 [doi]
- Data mining without data: a novel approach to privacy-preserving collaborative distributed data miningVikas G. Ashok, Ravi Mukkamala. 159-164 [doi]
- I know where you live: analyzing privacy protection in public databasesManya Sleeper, Divya Sharma, Lorrie Faith Cranor. 165-170 [doi]
- Privacy of data outsourced to a cloud for selected readers through client-side encryptionWitold Litwin, Sushil Jajodia, Thomas J. E. Schwarz. 171-176 [doi]
- Compressive mechanism: utilizing sparse representation in differential privacyYang D. Li, Zhenjie Zhang, Marianne Winslett, Yin Yang. 177-182 [doi]