Abstract is missing.
- Forward-Security Under Continual LeakageMihir Bellare, Adam O'Neill, Igors Stepanovs. 3-26 [doi]
- Tightly-Secure PAK(E)José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Sala, Marjan Skrobot. 27-48 [doi]
- On the Security of Frequency-Hiding Order-Preserving EncryptionMatteo Maffei, Manuel Reinert, Dominique Schröder. 51-70 [doi]
- Privacy-Preserving Whole-Genome Variant QueriesDaniel Demmler, Kay Hamacher, Thomas Schneider 0003, Sebastian Stammler. 71-92 [doi]
- A New Secure Matrix Multiplication from Ring-LWELihua Wang 0001, Yoshinori Aono, Le Trieu Phong. 93-111 [doi]
- Subset Predicate Encryption and Its ApplicationsJonathan Katz, Matteo Maffei, Giulio Malavolta, Dominique Schröder. 115-134 [doi]
- Multi-client Predicate-Only Encryption for Conjunctive Equality TestsTim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker. 135-157 [doi]
- Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough?Elena Pagnin, Jing Liu, Aikaterini Mitrokotsa. 161-178 [doi]
- Towards Attribute-Based Credentials in the CloudStephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks. 179-202 [doi]
- Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring SignaturesXavier Bultel, Pascal Lafourcade 0001. 203-226 [doi]
- Out of the Dark: UI Redressing and Trustworthy EventsMarcus Niemietz, Jörg Schwenk. 229-249 [doi]
- A Paged Domain Name System for Query PrivacyDaniele Enrico Asoni, Samuel Hitz, Adrian Perrig. 250-273 [doi]
- A New Approach to Deanonymization of Unreachable Bitcoin NodesIndra Deep Mastan, Souradyuti Paul. 277-298 [doi]
- Towards a Smart Contract-Based, Decentralized, Public-Key InfrastructureChristos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias. 299-321 [doi]
- Secure Code Updates for Smart Embedded Devices Based on PUFsWei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, XiaoBo Chu, Dengguo Feng. 325-346 [doi]
- A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area NetworkTomer Ashur, Jeroen Delvaux, Sanghan Lee, Pieter Maene, Eduard Marin, Svetla Nikova, Oscar Reparaz, Vladimir Rozic, Dave Singelée, Bohan Yang 0001, Bart Preneel. 347-369 [doi]
- Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android AppsQi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu. 373-389 [doi]
- Two Cents for Strong Anonymity: The Anonymous Post-office ProtocolNethanel Gelernter, Amir Herzberg, Hemi Leibowitz. 390-412 [doi]
- Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLANDaniele Antonioli, Sandra Siby, Nils Ole Tippenhauer. 415-435 [doi]
- A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication SystemsMohammad Hossein Chinaei, Diethelm Ostry, Vijay Sivaraman. 436-455 [doi]
- A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without Pairing in the Random Oracle ModelS. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandu Rangan. 459-469 [doi]
- Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and MartinMayur Punekar, Qutaibah M. Malluhi, Yvo Desmedt, Yongge Wang. 470-481 [doi]
- (Finite) Field Work: Choosing the Best Encoding of Numbers for FHE ComputationAngela Jäschke, Frederik Armknecht. 482-492 [doi]
- An Efficient Attribute-Based Authenticated Key Exchange ProtocolSuvradip Chakraborty, Y. Sreenivasa Rao, Chandrasekaran Pandu Rangan. 493-503 [doi]
- Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key ExposureBaodong Qin, Qinglan Zhao, Dong Zheng 0001, Hui Cui. 504-514 [doi]
- A New Direction for Research on Data Origin Authentication in Group CommunicationRobert Annessi, Tanja Zseby, Joachim Fabini. 515-525 [doi]
- Modelling Traffic Analysis in Home Automation SystemsFrederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, Christoph Sorge. 526-536 [doi]
- VisAuth: Authentication over a Visual Channel Using an Embedded ImageJack Sturgess, Ivan Martinovic. 537-546 [doi]