| 2008 | An Indistinguishability-Based Characterization of Anonymous Channels. Alejandro Hevia, Daniele Micciancio |
| 2008 | Analyzing PETs for Enterprise Operations. Stuart Shapiro, Aaron Powell |
| 2008 | Breaking and Provably Fixing Minx. Erik Shimshock, Matt Staats, Nicholas Hopper |
| 2008 | Bridging and Fingerprinting: Epistemic Attacks on Route Selection. George Danezis, Paul F. Syverson |
| 2008 | Chattering Laptops. Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed |
| 2008 | Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover. Aaron Richard Coble |
| 2008 | How to Bypass Two Anonymity Revocation Schemes. George Danezis, Len Sassaman |
| 2008 | Metrics for Security and Performance in Low-Latency Anonymity Systems. Steven J. Murdoch, Robert N. M. Watson |
| 2008 | On the Impact of Social Network Profiling on Anonymity. Claudia Díaz, Carmela Troncoso, Andrei Serjantov |
| 2008 | PAR: Payment for Anonymous Routing. Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M. Bellovin |
| 2008 | Perfect Matching Disclosure Attacks. Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede |
| 2008 | Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings Nikita Borisov, Ian Goldberg |
| 2008 | Reputation Systems for Anonymous Networks. Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin |
| 2008 | Shining Light in Dark Places: Understanding the Tor Network. Damon McCoy, Kevin S. Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker |
| 2008 | Studying Timing Analysis on the Internet with SubRosa. Hatim Daginawala, Matthew K. Wright |