Abstract is missing.
- Efficient, Reusable Fuzzy Extractors from LWEDaniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz. 1-18 [doi]
- GenFace: Improving Cyber Security Using Realistic Synthetic Face GenerationMargarita Osadchy, Yan Wang, Orr Dunkelman, Stuart J. Gibson, Julio Hernandez-Castro, Christopher J. Solomon. 19-33 [doi]
- Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract)Tomer Cohen, Danny Hendler, Dennis Potashnik. 34-49 [doi]
- Building Regular Registers with Rational Malicious Servers and Anonymous ClientsAntonella Del Pozzo, Silvia Bonomi, Riccardo Lazzeretti, Roberto Baldoni. 50-67 [doi]
- On the Optimality of the Exponential MechanismFrancesco Aldà , Hans-Ulrich Simon. 68-85 [doi]
- On Pairing Inversion of the Self-bilinear Map on Unknown Order GroupsHyang-Sook Lee, Seongan Lim, Ikkwon Yie. 86-95 [doi]
- Brief Announcement: Anonymous Credentials Secure to Ephemeral LeakageLukasz Krzywiecki, Marta Wszola, Miroslaw Kutylowski. 96-98 [doi]
- The Combinatorics of Product Scanning Multiplication and SquaringAdam L. Young, Moti Yung. 99-114 [doi]
- Stylometric Authorship Attribution of Collaborative DocumentsEdwin Dauber, Rebekah Overdorf, Rachel Greenstadt. 115-135 [doi]
- A Distributed Investment Encryption Scheme: InvestcoinFilipp Valovich. 136-154 [doi]
- Physical Layer Security over Wiretap Channels with Random ParametersZiv Goldfeld, Paul W. Cuff, Haim H. Permuter. 155-170 [doi]
- Assisting Malware Analysis with Symbolic Execution: A Case StudyRoberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu. 171-188 [doi]
- Brief Announcement: A Consent Management Solution for EnterprisesAbigail Goldsteen, Shelly Garion, Sima Nadler, Natalia Razinkov, Yosef Moatti, Paula Ta-Shma. 189-192 [doi]
- Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third PartyNir Maoz, Ehud Gudes. 193-195 [doi]
- Brief Announcement: A Technique for Software Robustness Analysis in Systems Exposed to Transient Faults and AttacksSergey Frenkel, Victor Zakharov. 196-199 [doi]
- Symmetric-Key Broadcast Encryption: The Multi-sender CaseCody Freitag, Jonathan Katz, Nathan Klein. 200-214 [doi]
- A Supervised Auto-Tuning Approach for a Banking Fraud Detection SystemMichele Carminati, Luca Valentini, Stefano Zanero. 215-233 [doi]
- Scalable Attack Path Finding for Increased SecurityTom Gonda, Rami Puzis, Bracha Shapira. 234-249 [doi]
- Learning Representations for Log Data in CybersecurityIgnacio Arnaldo, Alfredo Cuesta-Infante, Ankit Arun, Mei Lam, Costas Bassias, Kalyan Veeramachaneni. 250-268 [doi]
- Attack Graph ObfuscationHadar Polad, Rami Puzis, Bracha Shapira. 269-287 [doi]
- Malware Triage Based on Static Features and Public APT ReportsGiuseppe Laurenza, Leonardo Aniello, Riccardo Lazzeretti, Roberto Baldoni. 288-305 [doi]