Abstract is missing.
- The post anachronism: the temporal dimension of facebook privacyLujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur. 1-12 [doi]
- Anonymously sharing Flickr pictures with facebook friendsJan Camenisch, Günter Karjoth, Gregory Neven, Franz-Stefan Preiss. 13-24 [doi]
- On the use of decentralization to enable privacy in web-scale recommendation servicesAnimesh Nandi, Armen Aghasaryan, Ishan Chhabra. 25-36 [doi]
- Optimally private access controlMarkulf Kohlweiss, Alfredo Rial. 37-48 [doi]
- You cannot hide for long: de-anonymization of real-world dynamic behaviourGeorge Danezis, Carmela Troncoso. 49-60 [doi]
- Analysis of the impact of data granularity on privacy for the smart gridValentin Tudor, Magnus Almgren, Marina Papatriantafilou. 61-70 [doi]
- Thinking inside the BLAC box: smarter protocols for faster anonymous blacklistingRyan Henry, Ian Goldberg. 71-82 [doi]
- Distributed privacy-preserving transparency loggingTobias Pulls, Roel Peeters, Karel Wouters. 83-94 [doi]
- Protecting and evaluating genomic privacy in medical tests and personalized medicineErman Ayday, Jean Louis Raisaro, Jean-Pierre Hubaux, Jacques Rougemont. 95-106 [doi]
- Secure genomic testing with size- and position-hiding private substring matchingEmiliano De Cristofaro, Sky Faber, Gene Tsudik. 107-118 [doi]
- Outsourced private information retrievalYizhou Huang, Ian Goldberg. 119-130 [doi]
- Distributed ElGamal à la Pedersen: Application to HeliosVéronique Cortier, David Galindo, Stéphane Glondu, Malika Izabachène. 131-142 [doi]
- Privacy-preserving billing for e-ticketing systems in public transportationFlorian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko. 143-154 [doi]
- Canon-MPC, a system for casual non-interactive secure multi-party computation using native clientAyman Jarrous, Benny Pinkas. 155-166 [doi]
- Optimal sporadic location privacy preserving systems in presence of bandwidth constraintsMichael Herrmann, Carmela Troncoso, Claudia Díaz, Bart Preneel. 167-178 [doi]
- Inferring social ties in academic networks using short-range wireless communicationsIgor Bilogrevic, Kévin Huguenin, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg, Valtteri Niemi. 179-188 [doi]
- Redeem with privacy (RWP): privacy protecting framework for geo-social commerceMd. Moniruzzaman, Ken Barker. 189-200 [doi]
- Improved website fingerprinting on TorTao Wang, Ian Goldberg. 201-212 [doi]
- ScrambleSuit: a polymorphic network protocol to circumvent censorshipPhilipp Winter, Tobias Pulls, Jürgen Fuß. 213-224 [doi]
- On the limits of provable anonymityNethanel Gelernter, Amir Herzberg. 225-236 [doi]
- Using mobile device communication to strengthen e-Voting protocolsMichael Backes, Martin Gagné, Malte Skoruppa. 237-242 [doi]
- Conscript your friends into larger anonymity sets with JavaScriptHenry Corrigan-Gibbs, Bryan Ford. 243-248 [doi]
- Improved group off-the-record messagingHong Liu, Eugene Y. Vasserman, Nicholas Hopper. 249-254 [doi]
- The password allocation problem: strategies for reusing passwords effectivelyRishab Nithyanand, Rob Johnson. 255-260 [doi]
- Proactive insider threat detection through social media: the YouTube caseMiltiadis Kandias, Vasilis Stavrou, Nick Bozovic, Dimitris Gritzalis. 261-266 [doi]
- Inferring trip destinations from driving habits dataRinku Dewri, Prasad Annadata, Wisam Eltarjaman, Ramakrishna Thurimella. 267-272 [doi]
- Challenges of keyword-based location disclosureChristopher Riederer, Augustin Chaintreau, Jacob Cahan, Vijay Erramilli. 273-278 [doi]
- Privacy awareness about information leakage: who knows what about me?Delfina Malandrino, Andrea Petta, Vittorio Scarano, Luigi Serra, Raffaele Spinelli, Balachander Krishnamurthy. 279-284 [doi]
- SideAuto: quantitative information flow for side-channel leakage in web applicationsXujing Huang, Pasquale Malacaria. 285-290 [doi]
- No surprises: measuring intrusiveness of smartphone applications by detecting objective context deviationsFrances Zhang, Fuming Shih, Daniel J. Weitzner. 291-296 [doi]