Abstract is missing.
- Tracking and Tricking a Profiler: Automated Measuring and Influencing of Bluekai's Interest ProfilingMartin Degeling, Jan Nierhoff. 1-13 [doi]
- To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web LoginsGábor György Gulyás, Dolière Francis Somé, Nataliia Bielova, Claude Castelluccia. 14-27 [doi]
- Invisible Pixels Are Dead, Long Live Invisible Pixels!Jukka Ruohonen, Ville Leppänen. 28-32 [doi]
- The Accuracy of the Demographic Inferences Shown on Google's Ad SettingsMichael Carl Tschantz, Serge Egelman, Jaeyoung Choi, Nicholas Weaver, Gerald Friedland. 33-41 [doi]
- Faster PCA and Linear Regression through Hypercubes in HElibDeevashwer Rathee, Pradeep Kumar Mishra, Masaya Yasuda. 42-53 [doi]
- Can You Find The One for Me?Yongjun Zhao 0001, Sherman S. M. Chow. 54-65 [doi]
- Examining Leakage of Access Counts in ORAM ConstructionsNikolaos P. Karvelas, Amos Treiber, Stefan Katzenbeisser 0001. 66-70 [doi]
- Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic DatabasesThomas Schneider 0003, Oleksandr Tkachenko. 71-75 [doi]
- TightRope: Towards Optimal Load-balancing of Paths in Anonymous NetworksHussein Darir, Hussein Sibai, Nikita Borisov, Geir E. Dullerud, Sayan Mitra. 76-85 [doi]
- ClaimChain: Improving the Security and Privacy of In-band Key Distribution for MessagingBogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso. 86-103 [doi]
- What's a Little Leakage Between Friends?Sebastian Angel, David Lazar, Ioanna Tzialla. 104-108 [doi]
- DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting FlowsDavid Lu, Sanjit Bhat, Albert Kwon, Srinivas Devadas. 109-113 [doi]
- Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity EcosystemKai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber. 114-120 [doi]
- NRF: A Naive Re-identification FrameworkShubhra Kanti Karmaker Santu, Vincent Bindschaedler, ChengXiang Zhai, Carl A. Gunter. 121-132 [doi]
- Issues Encountered Deploying Differential PrivacySimson L. Garfinkel, John M. Abowd, Sarah Powazek. 133-137 [doi]
- Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code StylometryChristopher McKnight, Ian Goldberg. 138-142 [doi]
- Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy ProtectionMajed Alshammari, Andrew Simpson. 143-154 [doi]
- SGX Enforcement of Use-Based PrivacyEleanor Birrell, Anders T. Gjerdrum, Robbert van Renesse, Håvard D. Johansen, Dag Johansen, Fred B. Schneider. 155-167 [doi]
- Comparing Hypothetical and Realistic Privacy ValuationsJoshua Tan, Mahmood Sharif, Sruti Bhagavatula, Matthias Beckerle, Michelle L. Mazurek, Lujo Bauer. 168-182 [doi]