Abstract is missing.
- Programmable Security in the Age of Software-Defined InfrastructureGuofei Gu. 1 [doi]
- Private Hierarchical Clustering and Efficient ApproximationXianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos. 3-20 [doi]
- ACCO: Algebraic Computation with ComparisonXiaoqi Duan, Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song. 21-38 [doi]
- Privacy-enhanced OptiSwapSepideh Avizheh, Preston Haffey, Reihaneh Safavi-Naini. 39-57 [doi]
- Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry Scale DeploymentMahnush Movahedi, Benjamin M. Case, James Honaker, Andrew Knox, Li Li, Yiming Paul Li, Sanjay Saravanan, Shubho Sengupta, Erik Taubeneck. 59-69 [doi]
- Security in a Cloud BazaarOrran Krieger. 71-72 [doi]
- m-Stability: Threshold Security Meets Transferable UtilityOsman Biçer, Burcu Yildiz, Alptekin Küpçü. 73-82 [doi]
- Secure Featurization and Applications to Secure Phishing DetectionAkash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta 0001, Arun Gururajan, Huan Yu. 83-95 [doi]
- ROSEN: RObust and SElective Non-repudiation (for TLS)Srdjan Capkun, Ercan Ozturk, Gene Tsudik, Karl Wüst. 97-109 [doi]
- Guardian: Symbolic Validation of Orderliness in SGX EnclavesPedro Antonino, Wojciech Aleksander Woloszyn, A. W. Roscoe 0001. 111-123 [doi]
- Live Migration of Operating System Containers in Encrypted Virtual MachinesJoana Pecholt, Monika Huber, Sascha Wessel. 125-137 [doi]
- Automating Seccomp Filter Generation for Linux ApplicationsClaudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz 0001. 139-151 [doi]
- Data Sovereignty in the Cloud - Wishful Thinking or Reality?Christian Banse. 153-154 [doi]