Abstract is missing.
- Ledger design language: designing and deploying formally verified public ledgersNadim Kobeissi, Natalia Kulatova. 1-5 [doi]
- Vulnerability Detection on Mobile Applications Using State Machine InferenceWesley van der Lee, Sicco Verwer. 1-10 [doi]
- Inferring OpenVPN State Machines Using Protocol State FuzzingLesly-Ann Daniel, Erik Poll, Joeri de Ruiter. 11-19 [doi]
- Authenticated Data Structures for Privacy-Preserving Monero Light ClientsKevin Lee, Andrew Miller. 20-28 [doi]
- Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-DistributionOded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, Asaf Shabtai. 29-39 [doi]
- How to Squeeze a Crowd: Reducing Bandwidth in Mixing CryptocurrenciesAlishah Chator, Matthew Green. 40-49 [doi]
- The Impact of Uncle Rewards on Selfish Mining in EthereumFabian Ritz, Alf Zugenmaier. 50-57 [doi]
- A First Look at Browser-Based CryptojackingShayan Eskandari, Andreas Leoutsarakos, Troy Mursch, Jeremy Clark. 58-66 [doi]
- Blockchain as a Service (BaaS): Providers and TrustJatinder Singh, Johan David Michels. 67-74 [doi]
- Decentralizing Digital Identity: Open Challenges for Distributed LedgersPaul Dunphy, Luke Garratt, Fabien A. P. Petitcolas. 75-78 [doi]
- Interaction-Based Privacy Threat ElicitationLaurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen. 79-86 [doi]
- The Odyssey: Modeling Privacy Threats in a Brave New WorldRafa Galvez, Seda Gurses. 87-94 [doi]
- Privacy Risk Analysis to Enable Informed Privacy SettingsSourya Joyee De, Daniel Le Métayer. 95-102 [doi]
- FP -TESTER : Automated Testing of Browser Fingerprint ResilienceAntoine Vastel, Walter Rudametkin, Romain Rouvoy. 103-107 [doi]
- Methods and Tools for GDPR Compliance Through Privacy and Data Protection EngineeringYod-Samuel Martín, Antonio Kung. 108-111 [doi]
- It Takes a Village: A Community Based Participatory Framework for Privacy DesignDarakhshan J. Mir, Yan Shvartzshnaider, Mark Latonero. 112-115 [doi]
- Enhancing Transparency and Consent in the IoTClaude Castelluccia, Mathieu Cunche, Daniel Le Métayer, Victor Morel. 116-119 [doi]
- Privacy Compliance Via Model TransformationsThibaud Antignac, Riccardo Scandariato, Gerardo Schneider. 120-126 [doi]
- Simulation of a Trust and Reputation Based Mitigation Protocol for a Black Hole Style Attack on VANETsGiuseppe Primiero, Agostino Martorana, Jacopo Tagliabue. 127-135 [doi]
- Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and DependabilityAndrea Höller, Ronald Toegl. 136-144 [doi]
- The Secret Processor Will Go to the Ball: Benchmark Insider-Proof Encrypted ComputingPeter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001. 145-152 [doi]
- An Analysis of Cyber Security Attack TaxonomiesRichard Derbyshire, Benjamin Green, Daniel Prince, Andreas Mauthe, David Hutchison. 153-161 [doi]