Abstract is missing.
- Privacy-Enhanced Machine Learning with Functional EncryptionTilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic. 3-21 [doi]
- Towards Secure and Efficient Outsourcing of Machine Learning ClassificationYifeng Zheng, Huayi Duan, Cong Wang. 22-40 [doi]
- Confidential Boosting with Random Linear Classifiers for Outsourced User-Generated DataSagar Sharma, Keke Chen. 41-65 [doi]
- BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction AttacksHuadi Zheng, Qingqing Ye, Haibo Hu, Chengfang Fang, Jie Shi. 66-83 [doi]
- The Leakage-Resilience DilemmaBryan C. Ward, Richard Skowyra, Chad Spensky, Jason Martin, Hamed Okhravi. 87-106 [doi]
- A Taxonomy of Attacks Using BGP BlackholingLoïc Miller, Cristel Pelsser. 107-127 [doi]
- Local Obfuscation Mechanisms for Hiding Probability DistributionsYusuke Kawamoto 0001, Takao Murakami. 128-148 [doi]
- A First Look into Privacy Leakage in 3D Mixed Reality DataJaybie A. de Guzman, Kanchana Thilakarathna, Aruna Seneviratne. 149-169 [doi]
- Flexible Signatures: Making Authentication Suitable for Real-Time EnvironmentsDuc Viet Le, Mahimna Kelkar, Aniket Kate. 173-193 [doi]
- DGM: A Dynamic and Revocable Group Merkle SignatureMaxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Shifeng Sun. 194-214 [doi]
- Puncturable Proxy Re-Encryption Supporting to Group Messaging ServiceTran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu. 215-233 [doi]
- Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus NetworkHui Guo, Zhenfeng Zhang, Jing Xu 0002, Mingyuan Xia. 234-256 [doi]
- Side-Channel Aware FuzzingPhilip Sperl, Konstantin Böttinger. 259-278 [doi]
- NetSpectre: Read Arbitrary Memory over NetworkMichael Schwarz 0001, Martin Schwarzl, Moritz Lipp, Jon Masters, Daniel Gruss. 279-299 [doi]
- maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical DefaultsGilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert. 300-318 [doi]
- Automated Formal Analysis of Side-Channel Attacks on Probabilistic SystemsChris Novakovic, David Parker 0001. 319-337 [doi]
- A Formal Model for Checking Cryptographic API Usage in JavaScriptDuncan Mitchell, Johannes Kinder. 341-360 [doi]
- Contingent Payments on a Public Ledger: Models and Reductions for Automated VerificationSergiu Bursuc, Steve Kremer. 361-382 [doi]
- Symbolic Analysis of Terrorist Fraud ResistanceAlexandre Debant, Stéphanie Delaune, Cyrille Wiedling. 383-403 [doi]
- Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUICShan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru. 404-426 [doi]
- Where to Look for What You See Is What You Sign? User Confusion in Transaction SecurityVincent Haupert, Stephan Gabert. 429-449 [doi]
- On the Security and Applicability of Fragile Camera FingerprintsErwin Quiring, Matthias Kirchner, Konrad Rieck. 450-470 [doi]
- Attacking Speaker Recognition Systems with Phoneme MorphingHenry Turner, Giulio Lovisotto, Ivan Martinovic. 471-492 [doi]
- Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection NetworksWeizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, Chunhua Su. 493-511 [doi]
- A Framework for Evaluating Security in the Presence of Signal Injection AttacksIlias Giechaskiel, Youqian Zhang, Kasper Bonne Rasmussen. 512-532 [doi]
- Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta PrivacySébastien Gondron, Sebastian Mödersheim. 535-555 [doi]
- ProCSA: Protecting Privacy in Crowdsourced Spectrum AllocationMax Curran, Xiao Liang, Himanshu Gupta, Omkant Pandey, Samir R. Das. 556-576 [doi]
- Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using BisimilarityIhor Filimonov, Ross Horne, Sjouke Mauw, Zach Smith. 577-594 [doi]
- Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group TestingKazuhiko Minematsu, Norifumi Kamiya. 595-615 [doi]
- Finding Flaws from Password Authentication Code in Android AppsSiqi Ma, Elisa Bertino, Surya Nepal, Juanru Li, Diethelm Ostry, Robert H. Deng, Sanjay Jha. 619-637 [doi]
- Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic ExecutionYao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu, Yuqing Zhang. 638-657 [doi]
- iCAT: An Interactive Customizable Anonymization ToolMomen Oqaily, Yosr Jarraya, Mengyuan Zhang, Lingyu Wang 0001, Makan Pourzandi, Mourad Debbabi. 658-680 [doi]
- Monitoring the GDPREmma Arfelt, David A. Basin, Søren Debois. 681-699 [doi]
- Incentives for Harvesting Attack in Proof of Work Mining PoolsYevhen Zolotavkin, Veronika Kuchta. 703-725 [doi]
- A Lattice-Based Linkable Ring Signature Supporting Stealth AddressesZhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, Duncan S. Wong. 726-746 [doi]
- Annotary: A Concolic Execution System for Developing Secure Smart ContractsKonrad Weiss, Julian Schütte. 747-766 [doi]
- PDFS: Practical Data Feed Service for Smart ContractsJuan Guarnizo, Pawel Szalachowski. 767-789 [doi]
- Towards a Marketplace for Secure Outsourced ComputationsHung Dang, Dat Le Tien, Ee-Chien Chang. 790-808 [doi]