144 Faysal Boukayoua, p.157 ,
Naessens Consumer Privacy Extending Comparison Shopping Sites by Privacy Information on Retailers, p.171 ,
Not-Track Techniques for Browsers and Their Implications for Consumers, p.187 ,
Privacy for Online Communities P2P Social Networks with Broadcast Encryption Protected Privacy . . . . 197 Oleksandr Bodriagov and Sonja Buchegger Privacy by Design: Does It Matter for Social Networks?, p.207 ,
Iannella Privacy for eHealth and eID Applications Privacy Preserving Mechanisms for a Pervasive eHealth System, p.221 ,
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation, 232 Ioannis Agrafiotis, Sadie Creese, and Michael Goldsmith Privacy Protection Goals and Their Implications for eID Systems . . . . . . 245 ,
Table of Contents XIII Privacy Attacks and Problems Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals, p.261 ,