Abstract is missing.
- Fairness-Aware Privacy-Preserving Record LinkageDinusha Vatsalan, Joyce Yu, Wilko Henecka, Brian Thorne. 3-18 [doi]
- Differentially Private Profiling of Anonymized Customer Purchase RecordsHiroaki Kikuchi. 19-34 [doi]
- P-Signature-Based Blocking to Improve the Scalability of Privacy-Preserving Record LinkageDinusha Vatsalan, Joyce Yu, Brian Thorne, Wilko Henecka. 35-51 [doi]
- Utility Promises of Self-Organising Maps in Privacy Preserving Data MiningKabiru Mohammed, Aladdin Ayesh, Eerke A. Boiten. 55-72 [doi]
- Multi-criteria Optimization Using l-diversity and t-closeness for k-anonymizationClémence Mauger, Gaël Le Mahec, Gilles Dequen. 73-88 [doi]
- ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-WorkMoe Sabry, Reza Samavi, Douglas Stebila. 89-107 [doi]
- Joint Obfuscation for Privacy Protection in Location-Based Social NetworksBehnaz Bostanipour, George Theodorakopoulos 0001. 111-127 [doi]
- Modeling and Analyzing the Corona-Virus Warning App with the Isabelle Infrastructure FrameworkFlorian Kammüller, Bianca Lutz. 128-144 [doi]
- Extracting Speech from Motion-Sensitive SensorsSafaa Azzakhnini, Ralf C. Staudemeyer. 145-160 [doi]
- PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection RequirementsNicolás E. Díaz Ferreyra, Patrick Tessier, Gabriel Pedroza, Maritta Heisel. 161-177 [doi]
- Towards Multiple Pattern Type Privacy Protection in Complex Event Processing Through Event Obfuscation StrategiesSaravana Murthy Palanisamy. 178-194 [doi]
- GPS-Based Behavioral Authentication Utilizing Distance CoherenceTran Phuong Thao, Rie Shigetomi Yamaguchi. 195-215 [doi]
- Short Paper: Integrating the Data Protection Impact Assessment into the Software Development LifecycleChristopher Irvine, Dharini Balasubramaniam, Tristan Henderson. 219-228 [doi]
- Citizens as Data Donors: Maximizing Participation Through Privacy Assurance and Behavioral Change - (Short Paper)Mohamad Gharib. 229-239 [doi]
- Tracking the Invisible: Privacy-Preserving Contact Tracing to Control the Spread of a VirusDidem Demirag, Erman Ayday. 240-249 [doi]
- Privacy Policy Classification with XLNet (Short Paper)Majd Mustapha, Katsiaryna Krasnashchok, Anas Al Bassit, Sabri Skhiri. 250-257 [doi]
- Every Query Counts: Analyzing the Privacy Loss of Exploratory Data AnalysesSaskia Nuñez von Voigt, Mira Pauli, Johanna Reichert, Florian Tschorsch. 258-266 [doi]
- TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction AggregationAlexei Zamyatin, Zeta Avarikioti, Daniel Pérez 0002, William J. Knottenbelt. 269-286 [doi]
- VRF-Based Mining Simple Non-outsourceable Cryptocurrency MiningRunchao Han, Haoyu Lin, Jiangshan Yu. 287-304 [doi]
- On the Selection of the LN Client Implementation ParametersLuis E. Oleas Chavez, Cristina Pérez-Solà, Jordi Herrera-Joancomartí. 305-318 [doi]
- Privacy Preserving Netting Protocol for Inter-bank PaymentsHisham S. Galal, Amr M. Youssef. 319-334 [doi]
- Triptych: Logarithmic-Sized Linkable Ring Signatures with ApplicationsSarang Noether, Brandon Goodell. 337-354 [doi]
- Moderated Redactable Blockchains: A Definitional Framework with an Efficient ConstructMohammad Sadeq Dousti, Alptekin Küpçü. 355-373 [doi]
- Radium: Improving Dynamic PoW TargetingGeorge Bissias. 374-389 [doi]
- Proof of No-Work: How to Incentivize Individuals to Stay at HomeMichael Bartholic, Jianan Su, Ryosuke Ushida, Yusuke Ikeno, Zhengrong Gu, Shin'ichiro Matsuo. 390-406 [doi]
- Fundamental Properties of the Layer Below a Payment Channel NetworkMatthias Grundmann, Hannes Hartenstein. 409-420 [doi]
- Zerojoin: Combining Zerocoin and CoinJoinAlexander Chepurnoy, Amitabh Saxena. 421-436 [doi]
- DOGSOut: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed OpeningMarina Dehez-Clementi, Jean-Christophe Deneuville, Jérôme Lacan, Hassan Jameel Asghar, Dali Kaafar. 437-446 [doi]
- Tracking Mixed BitcoinsTin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just. 447-457 [doi]