J. Angulo and E. , 144 Faysal Boukayoua, p.157

K. Decroix, B. D. Decker, and V. , Naessens Consumer Privacy Extending Comparison Shopping Sites by Privacy Information on Retailers, p.171

U. König, M. Hansen-do, and .. , Not-Track Techniques for Browsers and Their Implications for Consumers, p.187

M. Beck, M. Marhöfer, and .. , Privacy for Online Communities P2P Social Networks with Broadcast Encryption Protected Privacy . . . . 197 Oleksandr Bodriagov and Sonja Buchegger Privacy by Design: Does It Matter for Social Networks?, p.207

M. Islam and R. , Iannella Privacy for eHealth and eID Applications Privacy Preserving Mechanisms for a Pervasive eHealth System, p.221

M. Milutinovic, K. Decroix, V. Naessens, B. De-decker, and .. , Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation, 232 Ioannis Agrafiotis, Sadie Creese, and Michael Goldsmith Privacy Protection Goals and Their Implications for eID Systems . . . . . . 245

H. Zwingelberg, M. Hansen, and .. , Table of Contents XIII Privacy Attacks and Problems Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals, p.261