Accepted articles here
Volume 18 Issue 2 Volume 18 Issue 1
Volume 17 Issue 3 Volume 17 Issue 2 Volume 17 Issue 1
Volume 16 Issue 3 Volume 16 Issue 2 Volume 16 Issue 1
Volume 15 Issue 3 Volume 15 Issue 2 Volume 15 Issue 1
Volume 14 Issue 3 Volume 14 Issue 2 Volume 14 Issue 1
Volume 13 Issue 3 Volume 13 Issue 2 Volume 13 Issue 1
Volume 12 Issue 3 Volume 12 Issue 2 Volume 12 Issue 1
Volume 11 Issue 3 Volume 11 Issue 2 Volume 11 Issue 1
Volume 10 Issue 3 Volume 10 Issue 2 Volume 10 Issue 1
Volume 9 Issue 3 Volume 9 Issue 2 Volume 9 Issue 1
Volume 8 Issue 3 Volume 8 Issue 2 Volume 8 Issue 1
Volume 7 Issue 3 Volume 7 Issue 2 Volume 7 Issue 1
Volume 6 Issue 3 Volume 6 Issue 2 Volume 6 Issue 1
Volume 5 Issue 3 Volume 5 Issue 2 Volume 5 Issue 1
Volume 4 Issue 3 Volume 4 Issue 2 Volume 4 Issue 1
Volume 3 Issue 3 Volume 3 Issue 2 Volume 3 Issue 1
Volume 2 Issue 3 Volume 2 Issue 2 Volume 2 Issue 1
Volume 1 Issue 3 Volume 1 Issue 2 Volume 1 Issue 1
Inference Attacks on Fuzzy Searchable Encryption Schemes
Daniel Homann, Lena Wiese
Transactions on Data Privacy 12:2 (2019) 91 - 115
Abstract, PDF
Privacy-Preserving Planarity Testing of Distributed Graphs
Guy Barshap, Tamir Tassa
Transactions on Data Privacy 12:2 (2019) 117 - 144
Analyzing the disclosure risk of regression coefficients
Felix Ritchie
Transactions on Data Privacy 12:2 (2019) 145 - 173
Spying on Instant Messaging Servers: Potential Privacy Leaks through Metadata
Alexandre Pujol, Damien Magoni, Liam Murphy, Christina Thorpe
Transactions on Data Privacy 12:2 (2019) 175 - 206