Abstract is missing.
- A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward ProgramsLucas M. Palma, Fernanda Oliveira Gomes, Martín A. Gagliotti Vigil, Jean Everson Martina. 3-20 [doi]
- WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted ApplicationsPriyanka Pal, Sudharsana K. J. L., Rohith Balaji S.. 21-32 [doi]
- Trustworthy Isolation of DMA Enabled DevicesJonas Haglund, Roberto Guanciale. 35-55 [doi]
- Toward Implementing Spatio-Temporal RBAC ExtensionsAditya Dubey, Uttara Ravi, Somya Sharma, Barsha Mitra. 59-78 [doi]
- VisMAP: Visual Mining of Attribute-Based Access Control PoliciesSaptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, Gerhard Rigoll. 79-98 [doi]
- Policy Reconciliation and Migration in Attribute Based Access ControlGunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural. 99-120 [doi]
- WiP: Generative Adversarial Network for Oversampling Data in Credit Card Fraud DetectionAkhilesh Gangwar, Vadlamani Ravi. 123-134 [doi]
- An Introduction to the CellTree Paradigm (Invited Paper)Anasuya Acharya, Manoj Prabhakaran, Akash Trehan. 137-153 [doi]
- Secure Information Flow Analysis Using the PRISM Model CheckerAli A. Noroozi, Khayyam Salehi, Jaber Karimpour, Ayaz Isazadeh. 154-172 [doi]
- Selective End-To-End Data-Sharing in the CloudFelix Hörandner, Sebastian Ramacher, Simon Roth. 175-195 [doi]
- Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound KeysFelix Hörandner, Franco Nieddu. 196-217 [doi]
- Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust RequirementsPranav Verma, Anish Mathuria, Sourish Dasgupta. 218-238 [doi]
- Wip: Degree Evaluation of Grain-v1Deepak Kumar Dalai, Santu Pal. 239-251 [doi]
- A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data PublishingBintu Kadhiwala, Sankita J. Patel. 255-275 [doi]
- WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White PixelsT. E. Jisha, Thomas Monoth. 279-289 [doi]
- A New High Capacity and Reversible Data Hiding Technique for ImagesEram Fatima, Saiful Islam. 290-304 [doi]
- Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC CoefficientsArkaprava Bhaduri Mandal, Tanmoy Kanti Das. 307-323 [doi]
- Differential Attack Graph-Based Approach for Assessing Change in the Network Attack SurfaceGhanshyam S. Bopche, Gopal N. Rai, B. Ramchandra Reddy, Babu M. Mehtre. 324-344 [doi]