Abstract is missing.
- Succinctly Verifiable Sealed-Bid Auction Smart ContractHisham S. Galal, Amr M. Youssef. 3-19 [doi]
- Blockchain-Based Fair Certified NotificationsMacià Mut Puigserver, María Magdalena Payeras Capellà, Miquel A. Cabot-Nadal. 20-37 [doi]
- On Symbolic Verification of Bitcoin's script LanguageRick Klomp, Andrea Bracciali. 38-56 [doi]
- Self-reproducing Coins as Universal Turing MachineAlexander Chepurnoy, Vasily Kharin, Dmitry Meshkov. 57-64 [doi]
- Split Payments in Payment NetworksDmytro Piatkivskyi, Mariusz Nowostawski. 67-75 [doi]
- Payment Network Design with FeesGeorgia Avarikioti, Gerrit Janssen, Yuyi Wang, Roger Wattenhofer. 76-84 [doi]
- Atomic Information Disclosure of Off-Chained Computations Using Threshold EncryptionOliver Stengele, Hannes Hartenstein. 85-93 [doi]
- Contour: A Practical System for Binary TransparencyMustafa Al-Bassam, Sarah Meiklejohn. 94-110 [doi]
- What Blockchain Alternative Do You Need?Tommy Koens, Erik Poll. 113-129 [doi]
- Valuable Puzzles for Proofs-of-WorkColin Boyd, Christopher Carr. 130-139 [doi]
- A Poisoning Attack Against Cryptocurrency Mining PoolsMohiuddin Ahmed, Jinpeng Wei, Yongge Wang, Ehab Al-Shaer. 140-154 [doi]
- Using Economic Risk to Model Miner Hash Rate Allocation in CryptocurrenciesGeorge Bissias, Brian Neil Levine, David Thibodeau. 155-172 [doi]
- Avoiding Deadlocks in Payment Channel NetworksShira Werman, Aviv Zohar. 175-187 [doi]
- Coloured Ring Confidential TransactionsFelix Engelmann, Frank Kargl, Christoph Bösch. 188-196 [doi]
- Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper)Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl. 197-206 [doi]
- Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk AnalysisMajed Alshammari, Andrew Simpson. 209-224 [doi]
- Privacy Risk Assessment: From Art to Science, by MetricsIsabel Wagner, Eerke A. Boiten. 225-241 [doi]
- Bootstrapping Online Trust: Timeline Activity ProofsConstantin Catalin Dragan, Mark Manulis. 242-259 [doi]
- Post-processing Methods for High Quality Privacy-Preserving Record LinkageMartin Franke, Ziad Sehili, Marcel Gladbach, Erhard Rahm. 263-278 [doi]
- \delta -DOCA: Achieving Privacy in Data StreamsBruno de C. Leal, Israel C. Vidal, Felipe T. Brito, Juvêncio S. Nobre, Javam C. Machado. 279-295 [doi]
- Data Oblivious Genome Variants Search on Intel SGXAvradip Mandal, John C. Mitchell, Hart Montgomery, Arnab Roy 0003. 296-310 [doi]
- Developing GDPR Compliant Apps for the EdgeTom Lodge, Andy Crabtree, Anthony Brown 0001. 313-328 [doi]
- YaPPL - A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT ScenariosMax-Robert Ulbricht, Frank Pallas. 329-344 [doi]
- PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested ExecutionNing Zhang 0017, Jin Li, Wenjing Lou, Y. Thomas Hou. 345-353 [doi]
- A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty ComputationMarcel von Maltitz, Georg Carle. 357-372 [doi]
- Privacy-Preserving Trade Chain DetectionStefan Wüller, Malte Breuer, Ulrike Meyer, Susanne Wetzel. 373-388 [doi]
- FHE-Compatible Batch Normalization for Privacy Preserving Deep LearningAlberto Ibarrondo, Melek Önen. 389-404 [doi]
- A General Algorithm for k-anonymity on Dynamic DatabasesJulián Salas, Vicenç Torra. 407-414 [doi]
- On Security of Anonymous Invitation-Based SystemNaoto Yanai, Jason Paul Cruz. 415-421 [doi]
- Probabilistic Metric Spaces for Privacy by Design Machine Learning Algorithms: Modeling Database ChangesVicenç Torra, Guillermo Navarro-Arribas. 422-430 [doi]
- Lifelogging Protection Scheme for Internet-Based Personal AssistantsDavid Pàmies-Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castellà-Roca, Joaquín García-Alfaro. 431-440 [doi]