Abstract is missing.
- "Major Key Alert!" Anomalous Keys in Tor RelaysGeorge Kadianakis, Claudia V. Roberts, Laura M. Roberts, Philipp Winter. 3-19 [doi]
- On Purpose and by Necessity: Compliance Under the GDPRDavid A. Basin, Søren Debois, Thomas T. Hildebrandt. 20-37 [doi]
- MP3: A More Efficient Private Presence ProtocolRahul Parhi, Michael Schliep, Nicholas Hopper. 38-57 [doi]
- Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model)Hovav Shacham. 61-79 [doi]
- Weak-Unforgeable Tags for Secure Supply Chain ManagementMarten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr. 80-98 [doi]
- Proof of Censorship: Enabling Centralized Censorship-Resistant Content ProvidersIan Martiny, Ian Miers, Eric Wustrow. 99-115 [doi]
- An Economic Study of the Effect of Android Platform Fragmentation on Security UpdatesSadegh Farhang, Aron Laszka, Jens Grossklags. 119-137 [doi]
- The Rules of Engagement for Bug Bounty ProgramsAron Laszka, Mingyi Zhao, Akash Malbari, Jens Grossklags. 138-159 [doi]
- Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security KeySanchari Das, Andrew Dingman, L. Jean Camp. 160-179 [doi]
- High-Precision Privacy-Preserving Real-Valued Function EvaluationChristina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric. 183-202 [doi]
- Faster Unbalanced Private Set IntersectionAmanda C. Davi Resende, Diego F. Aranha. 203-221 [doi]
- SWiM: Secure Wildcard Pattern Matching from OT ExtensionVladimir Kolesnikov, Mike Rosulek, Ni Trieu. 222-240 [doi]
- Attacks Against GSMA's M2M Remote Provisioning (Short Paper)Maxime Meyer, Elizabeth A. Quaglia, Ben Smyth. 243-252 [doi]
- Rescuing LoRaWAN 1.0Gildas Avoine, Loïc Ferreira. 253-271 [doi]
- Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning CompetitorsJordan Holland, R. Joseph Connor, J. Parker Diamond, Jared M. Smith, Max Schuchard. 272-287 [doi]
- Practically Efficient Secure Distributed Exponentiation Without Bit-DecompositionAbdelrahaman Aly, Aysajan Abidin, Svetla Nikova. 291-309 [doi]
- A Fourier Analysis Based Attack Against Physically Unclonable FunctionsFatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert. 310-328 [doi]
- On the Computational Complexity of Minimal Cumulative Cost Graph PebblingJeremiah Blocki, Samson Zhou. 329-346 [doi]
- Pricing AnonymityDaniel G. Arce, Rainer Böhme. 349-368 [doi]
- A New Look at the Refund Mechanism in the Bitcoin Payment ProtocolSepideh Avizheh, Reihaneh Safavi-Naini, Siamak F. Shahandashti. 369-387 [doi]
- Anonymous Reputation Systems Achieving Full Dynamicity from LatticesAli El Kaafarani, Shuichi Katsumata, Ravital Solomon. 388-406 [doi]
- Estimating Profitability of Alternative Cryptocurrencies (Short Paper)Danny Yuxing Huang, Kirill Levchenko, Alex C. Snoeren. 409-419 [doi]
- A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on BitcoinRoman Matzutt, Jens Hiller, Martin Henze, Jan Henrik Ziegeldorf, Dirk Müllmann, Oliver Hohlfeld, Klaus Wehrle. 420-438 [doi]
- Decentralization in Bitcoin and Ethereum NetworksAdem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, Emin Gün Sirer. 439-457 [doi]
- Anonymous Post-Quantum CryptocashHuang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au. 461-479 [doi]
- SpaceMint: A Cryptocurrency Based on Proofs of SpaceSunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joël Alwen, Krzysztof Pietrzak. 480-499 [doi]
- Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty EnforcementBernardo David, Rafael Dowsley, Mario Larangeira. 500-519 [doi]
- Designing Secure Ethereum Smart Contracts: A Finite State Machine Based ApproachAnastasia Mavridou, Aron Laszka. 523-540 [doi]
- A Formal Model of Bitcoin TransactionsNicola Atzei, Massimo Bartoletti, Stefano Lande, Roberto Zunino. 541-560 [doi]