Abstract is missing.
- Blind De-anonymization Attacks using Social NetworksWei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee. 1-4 [doi]
- AnNotify: A Private Notification ServiceAnia M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg. 5-15 [doi]
- Notify Assist: Balancing Privacy and Convenience in Delivery of Notifications on Android SmartphonesRaj Vardhan, Ameya Sanzgiri, Dattatraya Kulkarni, Piyush Joshi, Srikanth Nalluri. 17-20 [doi]
- SOMAR: Privacy-Preserving SOcial Media Advertising ARchitectureDaniela Becker, Jorge Guajardo, Karl-Heinz Zimmermann. 21-30 [doi]
- Is Bob Sending Mixed Signals?Michael Schliep, Ian Kariniemi, Nicholas Hopper. 31-40 [doi]
- BIOS ORAM: Improved Privacy-Preserving Data Access for Parameterized Outsourced StorageMichael T. Goodrich. 41-50 [doi]
- Mix-ORAM: Using Delegated ShufflesRaphael R. Toledo, George Danezis, Isao Echizen. 51-61 [doi]
- Adaptive Statistical Learning with Bayesian Differential PrivacyJun Zhao. 63-74 [doi]
- SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OSXin Chen, Heqing Huang, Sencun Zhu, Qing Li, Quanlong Guan. 75-86 [doi]
- Private Set Projections & VariantsXavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik. 87-98 [doi]
- Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic ProposalShafi Goldwasser, Sunoo Park. 99-110 [doi]
- A Framework of Privacy Preserving Anomaly Detection: Providing Traceability without Big BrotherHiromi Arai, Keita Emura, Takuya Hayashi 0001. 111-122 [doi]
- Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering OpportunitiesStefan Wüller, Michael Vu, Ulrike Meyer, Susanne Wetzel. 123-132 [doi]
- Using EEG-Based BCI Devices to Subliminally Probe for Private InformationMario Frank, Tiffany Hwu, Sakshi Jain, Robert T. Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Ivo Sluganovic, Dawn Song. 133-136 [doi]
- Is Geo-Indistinguishability What You Are Looking for?Simon Oya, Carmela Troncoso, Fernando Pérez-González. 137-140 [doi]
- is out to get youAaron D. Jaggard, Paul Syverson. 141-151 [doi]
- Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track BobPaul Vines, Franziska Roesner, Tadayoshi Kohno. 153-164 [doi]
- Analysis of Fingerprinting Techniques for Tor Hidden ServicesAndriy Panchenko, Asya Mitseva, Martin Henze, Fabian Lanze, Klaus Wehrle, Thomas Engel. 165-175 [doi]