Abstract is missing.
- Best Security Measures to Reduce Cyber-Incident and Data Breach RisksHiroaki Kikuchi, Michihiro Yamada, Kazuki Ikegami, Koji Inui. 3-19 [doi]
- Synthesizing Privacy-Preserving Location Traces Including Co-locationsJun Narita, Yayoi Suganuma, Masakatsu Nishigaki, Takao Murakami, Tetsushi Ohki. 20-36 [doi]
- Quantitative Rubric for Privacy Policy AnalysisPaul O'Donnell, Joe Harrison, Joshua Lyons, Lauren Anderson, Lauren Maunder, Sarah Ramboyong, Alan J. Michaels. 39-54 [doi]
- Rethinking the Limits of Mobile Operating System PermissionsBrian Krupp. 55-69 [doi]
- Interdependent Privacy Issues Are Pervasive Among Third-Party ApplicationsShuaishuai Liu, Barbara Herendi, Gergely Biczók. 70-86 [doi]
- SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative LearningKazuki Iwahana, Naoto Yanai, Jason Paul Cruz, Toru Fujiwara. 89-105 [doi]
- A k-Anonymised Federated Learning Framework with Decision TreesSaloni Kwatra, Vicenç Torra. 106-120 [doi]
- Anonymizing Machine Learning ModelsAbigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash. 121-136 [doi]
- A New Privacy Enhancing Beacon Scheme in V2X CommunicationTakahito Yoshizawa, Dave Singelée, Bart Preneel. 139-151 [doi]
- Next Generation Data Masking EngineMicha Moffie, Dan Mor, Sigal Asaf, Ariel Farkash. 152-160 [doi]
- Towards a Formal Approach for Data Minimization in Programs (Short Paper)Florian Lanzinger, Alexander Weigl. 161-169 [doi]
- Virtual ASICs: Generalized Proof-of-Stake Mining in CryptocurrenciesChaya Ganesh, Claudio Orlandi, Daniel Tschudi, Aviv Zohar. 173-191 [doi]
- Asymmetric Asynchronous Byzantine ConsensusChristian Cachin, Luca Zanolini. 192-207 [doi]
- Using Degree Centrality to Identify Market Manipulation on BitcoinDaiane M. Pereira, Rodrigo S. Couto. 208-223 [doi]
- Augmenting MetaMask to Support TLS-endorsed Smart ContractsUlrich Gallersdörfer, Jonas Ebel, Florian Matthes. 227-244 [doi]
- Smart Contracts for Incentivized Outsourcing of ComputationAlptekin Küpçü, Reihaneh Safavi-Naini. 245-261 [doi]
- Anonymous SidechainsFoteini Baldimtsi, Ian Miers, Xinyuan Zhang. 262-277 [doi]
- Filling the Tax Gap via Programmable MoneyDimitris Karakostas, Aggelos Kiayias. 281-288 [doi]
- Impact of Delay Classes on the Data Structure in IOTAAndreas Penzkofer, Olivia Saa, Daria Dziubaltowska. 289-300 [doi]
- Secure Static Content Delivery for CDN Using Blockchain TechnologyMauro Conti, P. Vinod 0001, Pier Paolo Tricomi. 301-309 [doi]
- Lattice-Based Proof-of-Work for Post-Quantum BlockchainsRouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz. 310-318 [doi]
- Blockchain-Based Two-Factor Authentication for Credit Card ValidationSuat Mercan, Mumin Cebe, Kemal Akkaya, Julian Zuluaga. 319-327 [doi]
- Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup TablesPanagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko. 328-339 [doi]