Abstract is missing.
- Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAMNikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser 0001, Erik Tews, Kay Hamacher. 1-10 [doi]
- Reconciling Utility with Privacy in GenomicsMathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti. 11-20 [doi]
- Oblivious Evaluation of Non-deterministic Finite Automata with Application to Privacy-Preserving Virus Genome DetectionHirohito Sasakawa, Hiroki Harada, David duVerle, Hiroki Arimura, Koji Tsuda, Jun Sakuma. 21-30 [doi]
- Fast and Private Genomic Testing for Disease SusceptibilityGeorge Danezis, Emiliano De Cristofaro. 31-34 [doi]
- Privacy Detective: Detecting Private Information and Collective Privacy Behavior in a Large Social NetworkAylin Caliskan Islam, Jonathan Walsh, Rachel Greenstadt. 35-46 [doi]
- An Automated Social Graph De-anonymization TechniqueKumar Sharad, George Danezis. 47-58 [doi]
- Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship LinksLei Jin, Hassan Takabi, Xuelian Long, James B. D. Joshi. 59-68 [doi]
- Adaptive Conflict Resolution Mechanism for Multi-party Privacy Management in Social MediaJose M. Such, Natalia Criado. 69-72 [doi]
- Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based ServicesGeorge Theodorakopoulos, Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec. 73-82 [doi]
- ProfileGuard: Privacy Preserving Obfuscation for Mobile User ProfilesImdad Ullah, Roksana Boreli, Salil S. Kanhere, Sanjay Chawla. 83-92 [doi]
- Privacy-PAC: Privacy-Enhanced Physical Access ControlJan Hajny, Petr Dzurenda, Lukas Malina. 93-96 [doi]
- Private Browsing: an Inquiry on Usability and Privacy ProtectionXianyi Gao, Yulong Yang, Huiqing Fu, Janne Lindqvist, Yang Wang. 97-106 [doi]
- What Deters Jane from Preventing Identification and Tracking on the Web?Fatemeh Shirazi, Melanie Volkamer. 107-116 [doi]
- General Area or Approximate Location?: How People Understand Location PermissionsHuiqing Fu, Janne Lindqvist. 117-120 [doi]
- CS-BuFLO: A Congestion Sensitive Website Fingerprinting DefenseXiang Cai, Rishab Nithyanand, Rob Johnson. 121-130 [doi]
- Glove: A Bespoke Website Fingerprinting DefenseRishab Nithyanand, Xiang Cai, Rob Johnson. 131-134 [doi]
- Identifying Webbrowsers in Encrypted CommunicationsJiangmin Yu, Eric Chan-Tin. 135-138 [doi]
- FARB: Fast Anonymous Reputation-Based Blacklisting without TTPsLi Xi, Dengguo Feng. 139-148 [doi]
- Sybil-Resistant Mixing for BitcoinGeorge Dean Bissias, A. Pinar Ozisik, Brian Neil Levine, Marc Liberatore. 149-158 [doi]
- Secure Evaluation Protocol for Personalized MedicineMentari Djatmiko, Arik Friedman, Roksana Boreli, Felix Lawrence, Brian Thorne, Stephen Hardy. 159-162 [doi]
- Facet: Streaming over Videoconferencing for Censorship CircumventionShuai Li, Mike Schliep, Nick Hopper. 163-172 [doi]
- Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name systemMatthew Thomas, Aziz Mohaisen. 173-180 [doi]
- IMUX: Managing Tor Connections from Two to Infinity, and BeyondJohn Geddes, Rob Jansen, Nicholas Hopper. 181-190 [doi]
- Pretty Bad Privacy: Pitfalls of DNS EncryptionHaya Shulman. 191-200 [doi]
- Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating MisuseBudi Arief, Kovila P. L. Coopamootoo, Martin Emms, Aad P. A. van Moorsel. 201-204 [doi]
- Stylometric Linkability of TweetsMishari Al Mishari, Dali Kaafar, Ekin Oguz, Gene Tsudik. 205-208 [doi]