Abstract is missing.
- MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority TrustworthinessMichael P. Heinl, Alexander Giehl, Norbert Wiedermann, Sven Plaga, Frank Kargl. 1-15 [doi]
- Verifiable Computation using Smart ContractsSepideh Avizheh, Mahmudun Nabi, Reihaneh Safavi-Naini, Muni Venkateswarlu K.. 17-28 [doi]
- Secure Delegation of Isogeny Computations and Cryptographic ApplicationsRobi Pedersen, Osmanbey Uzunkol. 29-42 [doi]
- ABSTRACT: Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten BattlefieldDou Goodman, Xin Hao, Yang Wang, Jiawei Tang, Yunhan Jia, Pei Wang, Tao Wei. 43 [doi]
- MalPro: A Learning-based Malware Propagation and Containment ModelingSaeed Valizadeh, Marten van Dijk. 45-56 [doi]
- PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile NetworksKalikinkar Mandal, Guang Gong. 57-68 [doi]
- AppMine: Behavioral Analytics for Web Application Vulnerability DetectionIndranil Jana, Alina Oprea. 69-80 [doi]
- ASTRA: High Throughput 3PC over Rings with Application to Secure PredictionHarsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh. 81-92 [doi]
- Efficient Multi-Party Private Set Intersection Against Malicious AdversariesEn Zhang, Feng-Hao Liu, Qiqi Lai, Ganggang Jin, Yu Li. 93-104 [doi]
- TaaS: Commodity MPC via Triples-as-a-ServiceNigel P. Smart, Titouan Tanguy. 105-116 [doi]
- Secure Data Exchange: A Marketplace in the CloudRan Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek. 117-128 [doi]
- Quantifying Information Leakage of Deterministic EncryptionMireya Jurado, Geoffrey Smith. 129-139 [doi]
- Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of RoundtripsPanagiotis Rizomiliotis, Stefanos Gritzalis. 141-152 [doi]
- Timing-Sensitive Synchronization for Efficient Secure Multi-ExecutionTobias F. Pfeffer, Sabine Glesner. 153-164 [doi]
- Secure and Private Function Evaluation with Intel SGXSusanne Felsen, Ágnes Kiss, Thomas Schneider 0003, Christian Weinert. 165-181 [doi]
- ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGXAntonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko. 183 [doi]
- S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGXFritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner. 185-199 [doi]
- Speculative Execution Attacks and Cloud SecurityYinqian Zhang, Radu Sion. 201 [doi]