Abstract is missing.
- What Satoshi Did Not KnowGavin Andresen. 3-10 [doi]
- Are You at Risk? Profiling Organizations and Individuals Subject to Targeted AttacksOlivier Thonnard, Leyla Bilge, Anand Kashyap, Martin Lee. 13-31 [doi]
- Computer-Supported Cooperative CrimeVaibhav Garg, Sadia Afroz, Rebekah Overdorf, Rachel Greenstadt. 32-43 [doi]
- There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency ScamsMarie Vasek, Tyler Moore. 44-61 [doi]
- Multi-class Traffic Morphing for Encrypted VoIP CommunicationW. Brad Moore, Henry Tan, Micah Sherr, Marcus A. Maloof. 65-85 [doi]
- Protecting Encrypted Cookies from Compression Side-Channel AttacksJanaka Alawatugoda, Douglas Stebila, Colin Boyd. 86-106 [doi]
- Fingerprinting Web Users Through Font MetricsDavid Fifield, Serge Egelman. 107-124 [doi]
- Sorting and Searching Behind the CurtainFoteini Baldimtsi, Olga Ohrimenko. 127-146 [doi]
- Resizable Tree-Based Oblivious RAMTarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan. 147-167 [doi]
- Sublinear Scaling for Multi-Client Private Information RetrievalWouter Lueks, Ian Goldberg. 168-186 [doi]
- Relay Cost Bounding for Contactless EMV PaymentsTom Chothia, Flavio D. Garcia, Joeri de Ruiter, Jordi van den Breekel, Matthew Thompson. 189-206 [doi]
- Private and Secure Public-Key Distance Bounding - Application to NFC PaymentSerge Vaudenay. 207-216 [doi]
- Purchase Details Leaked to PayPalSören Preibusch, Thomas Peetz, Gunes Acar, Bettina Berendt. 217-226 [doi]
- How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party ComputationDan Bogdanov, Marko Jõemets, Sander Siim, Meril Vaht. 227-234 [doi]
- Tactile One-Time Pad: Leakage-Resilient Authentication for SmartphonesSebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz. 237-253 [doi]
- User Authentication Using Human Cognitive AbilitiesAsadullah Al Galib, Reihaneh Safavi-Naini. 254-271 [doi]
- Smart and Secure Cross-Device Apps for the Internet of Advanced ThingsChristoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, N. Asokan. 272-290 [doi]
- Signatures and Efficient Proofs on Committed Graphs and NP-StatementsThomas Groß. 293-314 [doi]
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionYannis Rouselakis, Brent Waters. 315-332 [doi]
- Augmented Learning with Errors: The Untapped Potential of the Error TermRachid El Bansarkhani, Özgür Dagdelen, Johannes A. Buchmann. 333-352 [doi]
- BabelCrypt: The Universal Encryption Layer for Mobile Messaging ApplicationsAhmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William K. Robertson, Engin Kirda. 355-369 [doi]
- METDS - A Self-contained, Context-Based Detection System for Evil Twin Access PointsChristian Szongott, Michael Brenner, Matthew Smith 0001. 370-386 [doi]
- Market-Driven Code Provisioning to Mobile Secure HardwareAlexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos da Silva Ramos, Andre Rein, Ahmad-Reza Sadeghi. 387-404 [doi]
- On Non-cooperative Genomic PrivacyMathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti. 407-426 [doi]
- A Short Paper on the Incentives to Share Private Information for Population EstimatesMichela Chessa, Jens Grossklags, Patrick Loiseau. 427-436 [doi]
- Paying the Guard: An Entry-Guard-Based Payment System for TorPaolo Palmieri, Johan Pouwelse. 437-444 [doi]
- Proof-of-Work as Anonymous Micropayment: Rewarding a Tor RelayAlex Biryukov, Ivan Pustogarov. 445-455 [doi]
- Privacy Preserving Collaborative Filtering from Asymmetric Randomized EncodingYongjun Zhao, Sherman S. M. Chow. 459-477 [doi]
- Anonymous and Publicly Linkable Reputation SystemsJohannes Blömer, Jakob Juhnke, Christina Kolb. 478-488 [doi]
- Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field SensorsSebastian Biedermann, Stefan Katzenbeisser 0001, Jakub Szefer. 489-496 [doi]
- Hierarchical Deterministic Bitcoin Wallets that Tolerate Key LeakageGus Gutoski, Douglas Stebila. 497-504 [doi]
- Secure High-Rate Transaction Processing in BitcoinYonatan Sompolinsky, Aviv Zohar. 507-527 [doi]
- Inclusive Block Chain ProtocolsYoad Lewenberg, Yonatan Sompolinsky, Aviv Zohar. 528-547 [doi]
- VeriStream - A Framework for Verifiable Data StreamingDominique Schröder, Mark Simkin. 548-566 [doi]