Attacking Unlinkability: The Importance of Context.- A Fresh Look at the Generalised Mix Framework.- Two-Sided Statistical Disclosure Attack.- A Family of Dunces: Trivial RFID Identification and Authentication Protocols.- Louis, Lester and Pierre: Three Protocols for Location Privacy.- Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.- Pairing-Based Onion Routing.- Nymble: Anonymous IP-Address Blocking.- Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services.- Identity Trail: Covert Surveillance Using DNS.- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries.- Browser-Based Attacks on Tor.- Enforcing P3P Policies Using a Digital Rights Management System.- Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data.- Performance Comparison of Low-Latency Anonymisation Services from a User Perspective.- Anonymity in the Wild: Mixes on Unstructured Networks.