Table of Contents:
  • Privacy Vulnerabilities in Encrypted HTTP Streams
  • An Analysis of Parallel Mixing with Attacker-Controlled Inputs
  • Message Splitting Against the Partial Adversary
  • Location Privacy for Cellular Systems; Analysis and Solution
  • Towards Modeling Wireless Location Privacy
  • Failures in a Hybrid Content Blocking System
  • Anonymity Preserving Techniques in Trust Negotiations
  • Unmixing Mix Traffic
  • Mix-Network with Stronger Security
  • Covert Channels in IPv6
  • Towards Privacy-Aware eLearning
  • Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies
  • Privacy Issues in Vehicular Ad Hoc Networks
  • High-Power Proxies for Enhancing RFID Privacy and Utility
  • Integrating Utility into Face De-identification
  • Privacy in India: Attitudes and Awareness
  • Economics of Identity Management: A Supply-Side Perspective.