Reading List
Disclaimers:
- This list should be used only for choosing the papers to present (or a
    course project). We are not going to read and discuss all listed
    papers in class.
 - You can download the local copies only from a UW host. You can
also download a file with all the papers.
 - The topics are ordered randomly; we will likely discuss them in a
different order in class.
 
Location Sharing
Location Privacy
Location Proofs
Attacks
Privacy-preserving Computation
Differential Privacy
Privacy
Cloud Computing
Security for Smartphones
Voting Technologies
Security Economics
Security and Privacy Policies
Online Social Networking