Reading List

Disclaimers:

Location Sharing

Location Privacy

Location Proofs

Attacks

Privacy-preserving Computation

Differential Privacy

Privacy

Cloud Computing

Security for Smartphones

Voting Technologies

Security Economics

Security and Privacy Policies

Online Social Networking