Table of Contents:
  • Attacking Unlinkability: The Importance of Context
  • A Fresh Look at the Generalised Mix Framework
  • Two-Sided Statistical Disclosure Attack
  • A Family of Dunces: Trivial RFID Identification and Authentication Protocols
  • Louis, Lester and Pierre: Three Protocols for Location Privacy
  • Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker
  • Pairing-Based Onion Routing
  • Nymble: Anonymous IP-Address Blocking
  • Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services
  • Identity Trail: Covert Surveillance Using DNS
  • Sampled Traffic Analysis by Internet-Exchange-Level Adversaries
  • Browser-Based Attacks on Tor
  • Enforcing P3P Policies Using a Digital Rights Management System
  • Simplified Privacy Controls for Aggregated Services — Suspend and Resume of Personal Data
  • Performance Comparison of Low-Latency Anonymisation Services from a User Perspective
  • Anonymity in the Wild: Mixes on Unstructured Networks.