Abstract is missing.
- Digital Check Forgery Attacks on Client Check Truncation SystemsRigel Gjomemo, Hafiz Malik, Nilesh Sumb, V. N. Venkatakrishnan, Rashid Ansari. 3-20 [doi]
- Security Protocols and Evidence: Where Many Payment Systems FailSteven J. Murdoch, Ross J. Anderson. 21-32 [doi]
- The Ghosts of Banking Past: Empirical Analysis of Closed Bank WebsitesTyler Moore, Richard Clayton. 33-48 [doi]
- Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting SchemesAdam McCarthy, Ben Smyth, Elizabeth A. Quaglia. 51-63 [doi]
- Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing MessagesFranziska Roesner, Brian T. Gill, Tadayoshi Kohno. 64-76 [doi]
- On the Awareness, Control and Privacy of Shared Photo MetadataBenjamin Henne, Maximilian Koch, Matthew Smith. 77-88 [doi]
- Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing SecurityAlex Migicovsky, Zakir Durumeric, Jeff Ringenberg, J. Alex Halderman. 89-96 [doi]
- A Secure Data Deduplication Scheme for Cloud StorageJan Stanek, Alessandro Sorniotti, Elli Androulaki, Lukas Kencl. 99-118 [doi]
- Confidentiality Issues on a GPU in a Virtualized EnvironmentClémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon. 119-135 [doi]
- Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random StringsMehdi Tibouchi. 139-156 [doi]
- Elliptic Curve Cryptography in PracticeJoppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow. 157-175 [doi]
- Practical Secure Decision Tree Learning in a Teletreatment ApplicationSebastiaan de Hoogh, Berry Schoenmakers, Ping Chen, Harm op den Akker. 179-194 [doi]
- Scaling Private Set Intersection to Billion-Element SetsSeny Kamara, Payman Mohassel, Mariana Raykova 0001, Seyed Saeed Sadeghian. 195-215 [doi]
- Efficient Non-Interactive Zero Knowledge Arguments for Set OperationsPrastudy Fauzi, Helger Lipmaa, Bingsheng Zhang. 216-233 [doi]
- Garbled Searchable Symmetric EncryptionKaoru Kurosawa. 234-251 [doi]
- Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID DocumentsJulien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey. 255-272 [doi]
- A Short Paper on How to Improve U-Prove Using Self-Blindable CertificatesLucjan Hanzlik, Kamil Kluczniak. 273-282 [doi]
- Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked UsersLucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski. 283-290 [doi]
- Sample or Random Security - A Security Model for Segment-Based Visual CryptographySebastian Pape. 291-303 [doi]
- You Won't Be Needing These Any More: On Removing Unused Certificates from Trust StoresHenning Perl, Sascha Fahl, Matthew Smith. 307-315 [doi]
- Challenges in Protecting Tor Hidden Services from Botnet AbuseNicholas Hopper. 316-325 [doi]
- Identifying Risk Factors for Webserver CompromiseMarie Vasek, Tyler Moore. 326-345 [doi]
- Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensingBabins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan. 349-364 [doi]
- On the (In)Security of Mobile Two-Factor AuthenticationAlexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi. 365-383 [doi]
- MoP-2-MoP - Mobile Private MicrobloggingMarius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser, Ahmad-Reza Sadeghi. 384-396 [doi]
- Privacy Preserving Tâtonnement - A Cryptographic Construction of an Incentive Compatible MarketJohn Ross Wallrabenstein, Chris Clifton. 399-416 [doi]
- Estimating Systematic Risk in Real-World NetworksAron Laszka, Benjamin Johnson, Jens Grossklags, Márk Félegyházi. 417-435 [doi]
- Majority Is Not Enough: Bitcoin Mining Is VulnerableIttay Eyal, Emin Gün Sirer. 436-454 [doi]
- BitIodine: Extracting Intelligence from the Bitcoin NetworkMichele Spagnuolo, Federico Maggi, Stefano Zanero. 457-468 [doi]
- An Analysis of Anonymity in Bitcoin Using P2P Network TrafficPhilip Koshy, Diana Koshy, Patrick McDaniel. 469-485 [doi]
- Mixcoin: Anonymity for Bitcoin with Accountable MixesJoseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten. 486-504 [doi]