Abstract is missing.
- Mirrored Commitment: Fixing "Randomized Partial Checking" and ApplicationsPawel Lorek, Moti Yung, Filip Zagórski. 3-27 [doi]
- Bitcoin Clique: Channel-Free Off-Chain Payments Using Two-Shot Adaptor SignaturesSiavash Riahi 0002, Orfeas Stefanos Thyfronitis Litos. 28-50 [doi]
- Programmable Payment ChannelsRanjit Kumaresan, Duc Viet Le 0001, Mohsen Minaei, Srinivasan Raghuraman, Yibin Yang, Mahdi Zamani. 51-73 [doi]
- Fair Private Set Intersection Using Smart ContractsSepideh Avizheh, Reihaneh Safavi-Naini. 74-104 [doi]
- Powers-of-Tau to the People: Decentralizing Setup CeremoniesValeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh. 105-134 [doi]
- Self-sovereign Identity for Electric Vehicle ChargingAdrian Kailus, Dustin Kern, Christoph Krauß. 137-162 [doi]
- "Hello? Is There Anybody in There?" Leakage Assessment of Differential Privacy Mechanisms in Smart Metering InfrastructureSoumyadyuti Ghosh, Manaar Alam, Soumyajit Dey, Debdeep Mukhopadhyay. 163-189 [doi]
- Security Analysis of BigBlueButton and eduMEETNico Heitmann, Hendrik Siewert, Sven Moog, Juraj Somorovsky. 190-216 [doi]
- An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software ObfuscationNaiqian Zhang, Zheyun Feng, Dongpeng Xu 0001. 217-240 [doi]
- ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud SecurityKunal Mukherjee, Joshua Wiedemeier, Qi Wang 0017, Junpei Kamimura, Junghwan John Rhee, James Wei, Zhichun Li, Xiao Yu 0007, Lu-An Tang, Jiaping Gui, Kangkook Jee. 241-268 [doi]
- A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using RowhammerPuja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede. 271-300 [doi]
- A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber ImplementationRuize Wang, Martin Brisfors, Elena Dubrova. 301-324 [doi]
- Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit ConstructionsMohammad Hashemi, Domenic Forte, Fatemeh Ganji. 325-354 [doi]
- Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48Yunxue Lin, Ling Sun. 355-377 [doi]
- How Users Investigate Phishing Emails that Lack Traditional Phishing CuesDaniel Köhler, Wenzel Pünter, Christoph Meinel. 381-411 [doi]
- Usable Authentication in Virtual Reality: Exploring the Usability of PINs and GesturesH. T. M. A. Riyadh, Divyanshu Bhardwaj, Adrian Dabrowski, Katharina Krombholz. 412-431 [doi]
- Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile AppsXianbo Wang, Kaixuan Luo, Wing Cheong Lau. 432-459 [doi]