Abstract is missing.
- Understanding Craigslist Rental ScamsYoungsam Park, Damon McCoy, Elaine Shi. 3-21 [doi]
- Graph Analytics for Real-Time Scoring of Cross-Channel Transactional FraudIan Molloy, Suresh Chari, Ulrich Finkler, Mark Wiggerman, Coen Jonker, Ted Habeck, Youngja Park, Frank Jordens, Ron van Schaik. 22-40 [doi]
- Android UI Deception Revisited: Attacks and DefensesEarlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Zhuoqing Morley Mao, Atul Prakash. 41-59 [doi]
- Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational WorkersJassim Aljuraidan, Lujo Bauer, Michael K. Reiter, Matthias Beckerle. 60-77 [doi]
- Accountable Privacy for Decentralized Anonymous PaymentsChristina Garman, Matthew Green 0001, Ian Miers. 81-98 [doi]
- Private eCash in Practice (Short Paper)Amira Barki, Solenn Brunet, Nicolas Desmoulins, Sébastien Gambs, Saïd Gharout, Jacques Traoré. 99-109 [doi]
- Practically Efficient Secure Single-Commodity Multi-market AuctionsAbdelrahaman Aly, Mathieu Van Vyve. 110-129 [doi]
- How to Challenge and Cast Your e-VoteSandra Guasch, Paz Morillo. 130-145 [doi]
- VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private DatasetsAydin Abadi, Sotirios Terzis, Changyu Dong. 149-168 [doi]
- Confidential Benchmarking Based on Multiparty ComputationIvan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft. 169-187 [doi]
- Efficiently Making Secure Two-Party Computation FairHandan Kilinç, Alptekin Küpçü. 188-207 [doi]
- Fast Optimistically Fair Cut-and-Choose 2PCAlptekin Küpçü, Payman Mohassel. 208-228 [doi]
- CuriousDroid: Automated User Interface Interaction for Android Application Analysis SandboxesPatrick Carter, Collin Mulliner, Martina Lindorfer, William K. Robertson, Engin Kirda. 231-249 [doi]
- DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper)Alberto Coletta, Victor van der Veen, Federico Maggi. 250-259 [doi]
- DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi. 260-268 [doi]
- Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)Tristan Caulfield, Christos Ioannidis, David J. Pym. 271-279 [doi]
- Failures of Security APIs: A New CaseAbdalnaser Algwil, Jeff Yan. 283-298 [doi]
- Explicit Optimal Binary Pebbling for One-Way Hash Chain ReversalBerry Schoenmakers. 299-320 [doi]
- Factoring as a ServiceLuke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger. 321-338 [doi]
- The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper)Eric R. Verheul, Sietse Ringers, Jaap-Henk Hoepman. 339-345 [doi]
- A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active SoundsS. Abhishek Anand, Nitesh Saxena. 346-364 [doi]
- Leaky Birds: Exploiting Mobile Application Traffic for SurveillanceEline Vanrykel, Gunes Acar, Michael Herrmann, Claudia Díaz. 367-384 [doi]
- Footprint Scheduling for Dining-Cryptographer NetworksAnna Krasnova, Moritz Neikes, Peter Schwabe. 385-402 [doi]
- How Anywhere Computing Just Killed Your Phone-Based Two-Factor AuthenticationRadhesh Krishnan Konoth, Victor van der Veen, Herbert Bos. 405-421 [doi]
- Security Keys: Practical Cryptographic Second Factors for the Modern WebJuan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder, Sampath Srinivas. 422-440 [doi]
- Include Me Out: In-Browser Detection of Malicious Third-Party Content InclusionsSajjad Arshad, Amin Kharraz, William Robertson 0002. 441-459 [doi]
- A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued DataLiuhua Chen, Shenghai Zhong, Li e Wang, Xianxian Li. 460-473 [doi]
- Incentive Compatibility of Bitcoin Mining Pool Reward FunctionsOkke Schrijvers, Joseph Bonneau, Dan Boneh, Tim Roughgarden. 477-498 [doi]
- When Cryptocurrencies Mine Their Own BusinessJason Teutsch, Sanjay Jain, Prateek Saxena. 499-514 [doi]
- Optimal Selfish Mining Strategies in BitcoinAyelet Sapirshtein, Yonatan Sompolinsky, Aviv Zohar. 515-532 [doi]
- A Short Paper on Blind Signatures from Knowledge AssumptionsLucjan Hanzlik, Kamil Kluczniak. 535-543 [doi]
- KBID: Kerberos Bracelet Identification (Short Paper)Joseph Carrigan, Paul D. Martin 0002, Michael Rushanan. 544-551 [doi]
- The Other Side of the Coin: User Experiences with Bitcoin Security and PrivacyKatharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl. 555-580 [doi]
- Refund Attacks on Bitcoin's Payment ProtocolPatrick McCorry, Siamak F. Shahandashti, Feng Hao. 581-599 [doi]
- Are Payment Card Contracts Unfair? (Short Paper)Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini. 600-608 [doi]
- The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain WalletsMarie Vasek, Joseph Bonneau, Ryan Castellucci, Cameron Keith, Tyler Moore. 609-618 [doi]