Abstract is missing.
- An Efficient Self-blindable Attribute-Based Credential SchemeSietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman. 3-20 [doi]
- Real Hidden Identity-Based SignaturesSherman S. M. Chow, Haibin Zhang, Tao Zhang. 21-38 [doi]
- BehavioCog: An Observation Resistant Authentication SchemeJagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan, Mohamed Ali Kâafar. 39-58 [doi]
- Updatable Tokenization: Formal Definitions and Provably Secure ConstructionsChristian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, Anja Lehmann. 59-75 [doi]
- SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient UpdatesQian Wang, Kui Ren 0001, Minxin Du, Qi Li, Aziz Mohaisen. 79-97 [doi]
- Outsourcing Medical Dataset Analysis: A Possible SolutionGabriel Kaptchuk, Matthew Green 0001, Aviel Rubin. 98-123 [doi]
- Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data AggregationDavid Derler, Sebastian Ramacher, Daniel Slamanig. 124-142 [doi]
- A Provably Secure PKCS#11 Configuration Without Authenticated AttributesRyan Stanley-Oakes. 145-162 [doi]
- A Post-quantum Digital Signature Scheme Based on Supersingular IsogeniesYoungho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev. 163-181 [doi]
- Optimally Sound Sigma Protocols Under DCRAHelger Lipmaa. 182-203 [doi]
- Economically Optimal Variable Tag Length Message AuthenticationReihaneh Safavi-Naini, Viliam Lisý, Yvo Desmedt. 204-223 [doi]
- PEEP: Passively Eavesdropping Private Input via Brainwave SignalsAjaya Neupane, Md. Lutfor Rahman, Nitesh Saxena. 227-246 [doi]
- Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScriptMichael Schwarz, Clémentine Maurice, Daniel Gruss, Stefan Mangard. 247-267 [doi]
- Attacks on Secure Logging SchemesGunnar Hartung. 268-284 [doi]
- Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARSMatthew Smith 0006, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic. 285-301 [doi]
- Short Paper: A Longitudinal Study of Financial Apps in the Google Play StoreVincent F. Taylor, Ivan Martinovic. 302-309 [doi]
- Short Paper: Addressing Sophisticated Email AttacksMarkus Jakobsson. 310-317 [doi]
- Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using BitcoinSteven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan. 321-339 [doi]
- Trust Is Risk: A Decentralized Financial Trust PlatformOrfeas Stefanos Thyfronitis Litos, Dionysis Zindros. 340-356 [doi]
- A Smart Contract for Boardroom Voting with Maximum Voter PrivacyPatrick McCorry, Siamak F. Shahandashti, Feng Hao. 357-375 [doi]
- Improving Authenticated Dynamic Dictionaries, with Applications to CryptocurrenciesLeonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, Sasha Ivanov. 376-392 [doi]
- Short Paper: Service-Oriented Sharding for BlockchainsAdem Efe Gencer, Robbert van Renesse, Emin Gün Sirer. 393-401 [doi]
- The Security of NTP's Datagram ProtocolAanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg. 405-423 [doi]
- Short Paper: On Deployment of DNS-Based Security EnhancementsPawel Szalachowski, Adrian Perrig. 424-433 [doi]
- A Practical Multivariate Blind Signature SchemeAlbrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed. 437-454 [doi]
- Efficient Round-Optimal Blind Signatures in the Standard ModelEssam Ghadafi. 455-473 [doi]
- Secure Multiparty Computation from SGXRaad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi. 477-497 [doi]
- Efficient No-dictionary Verifiable Searchable Symmetric EncryptionWakaha Ogata, Kaoru Kurosawa. 498-516 [doi]
- Faster Homomorphic Evaluation of Discrete Fourier TransformsAnamaria Costache, Nigel P. Smart, Srinivas Vivek. 517-529 [doi]
- Short Paper: TLS Ecosystems in Networked Devices vs. Web ServersNayanamana Samarasinghe, Mohammad Mannan. 533-541 [doi]
- Unilaterally-Authenticated Key ExchangeYevgeniy Dodis, Dario Fiore. 542-560 [doi]
- Formal Modeling and Verification for Domain Validation and ACMEKarthikeyan Bhargavan, Antoine Delignat-Lavaud, Nadim Kobeissi. 561-578 [doi]
- Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking AppsTom Chothia, Flavio D. Garcia, Chris Heppel, Chris McMahon Stone. 579-597 [doi]
- Lavinia: An Audit-Payment Protocol for Censorship-Resistant StorageCecylia Bocovich, John A. Doucette, Ian Goldberg. 601-620 [doi]
- A Simpler Rate-Optimal CPIR ProtocolHelger Lipmaa, Kateryna Pavlyk. 621-638 [doi]