Abstract is missing.
- Is Privacy possible without Anonymity?: The case for microblogging servicesPanagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos. [doi]
- Forward and Backward Private Searchable Encryption with SGXGhous Amjad, Seny Kamara, Tarik Moataz. [doi]
- Configuration-Driven Software DebloatingHyungjoon Koo, Seyedhamed Ghavamnia, Michalis Polychronakis. [doi]
- T-IBE-T: Identity-Based Encryption for Inter-Tile CommunicationAlexander Würstlein, Wolfgang Schröder-Preikschat. [doi]
- Security Analysis of Devolo HomePIug DevicesRouven Scholz, Christian Wressnegger. [doi]
- Pythia: Identifying Dangerous Data-flows in Django-based ApplicationsLinos Giannopoulos, Eirini Degkleri, Panayiotis Tsanakas, Dimitris Mitropoulos. [doi]
- Pitfalls of open architecture: How friends can exploit your cryptocurrency walletThanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura. [doi]
- Static Analysis of ROP CodeDaniele Cono D'Elia, Emilio Coppa, Andrea Salvati, Camil Demetrescu. [doi]
- Market Manipulation as a Security Problem: Attacks and DefensesVasilios Mavroudis. [doi]