Abstract is missing.
- A Proof Calculus for Attack Trees in IsabelleFlorian Kammüller. 3-18 [doi]
- Confidentiality of Interactions in Concurrent Object-Oriented SystemsOlaf Owe, Toktam Ramezanifarkhani. 19-34 [doi]
- Using Oblivious RAM in Genomic StudiesNikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser 0001. 35-52 [doi]
- Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party ModelYuuji Furuta, Naoto Yanai, Masashi Karasaki, Katsuhiko Eguchi, Yasunori Ishihara, Toru Fujiwara. 55-69 [doi]
- Searchable Encrypted Relational Databases: Risks and CountermeasuresMohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann. 70-85 [doi]
- Private Verification of Access on Medical Data: An Initial StudyThaís Bardini Idalino, Dayana Spagnuelo, Jean Everson Martina. 86-103 [doi]
- Default Privacy Setting Prediction by Grouping User's Attributes and Settings PreferencesToru Nakamura, Welderufael B. Tesfay, Shinsaku Kiyomoto, Jetzabel Serna. 107-123 [doi]
- δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data MiningZhizhou Li, Ten-Hwang Lai. 124-142 [doi]
- Threshold Single Password AuthenticationDevris Isler, Alptekin Küpçü. 143-162 [doi]
- Towards a Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data PseudonymizationSaffija Kasem-Madani, Michael Meier 0001, Martin Wehner. 163-179 [doi]
- Privacy Dashcam - Towards Lawful Use of Dashcams Through Enforcement of External AnonymizationPaul Georg Wagner, Pascal Birnstill, Erik Krempel, Sebastian Bretthauer, Jürgen Beyerer. 183-201 [doi]
- DLoc: Distributed Auditing for Data Location Compliance in CloudMojtaba Eskandari, Bruno Crispo, Anderson Santana de Oliveira. 202-218 [doi]
- Inonymous: Anonymous Invitation-Based SystemSanaz Taheri-Boshrooyeh, Alptekin Küpçü. 219-235 [doi]
- PCS , A Privacy-Preserving Certification SchemeNesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Christophe Kiennert, Joaquín García-Alfaro. 239-256 [doi]
- Order-Preserving Encryption Using Approximate Integer Common DivisorsJames Dyer, Martin Dyer, Jie Xu. 257-274 [doi]
- Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data BlocksGiovanni Di Crescenzo, Brian A. Coan, Jonathan Kirsch. 275-294 [doi]
- Securing Proof-of-Stake Blockchain ProtocolsWenting Li, Sébastien Andreina, Jens-Matthias Bohli, Ghassan Karame. 297-315 [doi]
- Merged Mining: Curse or Cure?Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl. 316-333 [doi]
- Atomically Trading with Roger: Gambling on the Success of a HardforkPatrick McCorry, Ethan Heilman, Andrew Miller. 334-353 [doi]
- In Code We Trust? - Measuring the Control Flow Immutability of All Smart Contracts Deployed on EthereumMichael Fröwis, Rainer Böhme. 357-372 [doi]
- Who Am I? Secure Identity Registration on Distributed LedgersSarah Azouvi, Mustafa Al-Bassam, Sarah Meiklejohn. 373-389 [doi]
- A User-Centric System for Verified Identities on the Bitcoin BlockchainDaniel Augot, Hervé Chabanne, Thomas Chenevier, William George, Laurent Lambert. 390-407 [doi]
- Towards a Concurrent and Distributed Route Selection for Payment Channel NetworksElias Rohrer, Jann-Frederik Laß, Florian Tschorsch. 411-419 [doi]
- Graphene: A New Protocol for Block Propagation Using Set ReconciliationA. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Neil Levine. 420-428 [doi]
- Short Paper: Revisiting Difficulty Control for Blockchain SystemsDmitry Meshkov, Alexander Chepurnoy, Marc Jansen. 429-436 [doi]
- Secure Event Tickets on a BlockchainBjörn Tackmann. 437-444 [doi]