Abstract is missing.
- Inferring Sensitive Information in Cryptocurrency Off-Chain Networks Using Probing and Timing AttacksUtz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid 0001, Christian Decker. 1-21 [doi]
- Secure Ownership Transfer for Resource Constrained IoT InfrastructuresMartin Gunnarsson, Christian Gehrmann. 22-47 [doi]
- Untangling the XRP Ledger: Insights and AnalysisLara Mauri, Stelvio Cimato, Ernesto Damiani. 48-72 [doi]
- End to End Autorship Email Verification Framework for a Secure CommunicationGiacomo Giorgi, Andrea Saracino, Fabio Martinelli. 73-96 [doi]
- Symmetric and Asymmetric Schemes for Lightweight Secure CommunicationSimona Buchovecká, Róbert Lórencz, Jirí Bucek, Filip Kodýtek. 97-114 [doi]
- Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity TheftTimo Malderle, Felix Boes, Gina Muuss, Matthias Wübbeling, Michael Meier 0001. 115-138 [doi]
- Key Agreement in the Lightning Network ProtocolHans Hüttel, Vilim Staroveski. 139-155 [doi]
- Effects of Explanatory Information on Privacy Policy Summarization Tool PerceptionVanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto. 156-177 [doi]
- Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle EnvironmentsMirja Nitschke, Christian Roth, Christian Hoyer, Dogan Kesdogan. 178-200 [doi]
- Contextual Factors in Information Security Group Behaviour: A Comparison of Two StudiesDirk Snyman, Hennie A. Kruger. 201-221 [doi]
- Using MedBIoT Dataset to Build Effective Machine Learning-Based IoT Botnet Detection SystemsAlejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm. 222-243 [doi]