Abstract is missing.
- Relaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsCecilia Boschini, Jan Camenisch, Gregory Neven. 3-22 [doi]
- Secure Code Execution: A Generic PUF-Driven System ArchitectureStephan Kleber, Florian Unterstein, Matthias Hiller, Frank Slomka, Matthias Matousek, Frank Kargl, Christoph Bösch. 25-46 [doi]
- Lumus: Dynamically Uncovering Evasive Android ApplicationsVitor Monte Afonso, Anatoli Kalysch, Tilo Müller, Daniela A. S. de Oliveira, André Grégio, Paulo Lício de Geus. 47-66 [doi]
- ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple SoftwareKun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge, Hai-Xin Duan. 67-84 [doi]
- How Safe Is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key VerificationKemal Bicakci, Enes Altuncu, Muhammet Sakir Sahkulubey, Hakan Ezgi Kiziloz, Yusuf Uzunay. 85-98 [doi]
- Speeding up MILP Aided Differential Characteristic Search with Matsui's StrategyYingjie Zhang, Siwei Sun, Jiahao Cai, Lei Hu. 101-115 [doi]
- Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILPXuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin. 116-131 [doi]
- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear TrailsDaniël Bodden. 132-150 [doi]
- Conditional Cube Searching and Applications on Trivium-Variant CiphersXiaojuan Zhang 0003, Meicheng Liu, Dongdai Lin. 151-168 [doi]
- Practical Attacks on Relational Databases Protected via Searchable EncryptionMohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin. 171-191 [doi]
- A Simple Algorithm for Estimating Distribution Parameters from n n -Dimensional Randomized Binary ResponsesStaal A. Vinterbo. 192-209 [doi]
- Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine IntrospectionFangjie Jiang, Quanwei Cai, Le Guan, Jingqiang Lin. 213-230 [doi]
- Multi-authority Fast Data Cloud-Outsourcing for Mobile DevicesYanting Zhang, Jianwei Liu, Zongyang Zhang, Yang Hu. 231-249 [doi]
- Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRTOsmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy. 250-267 [doi]
- Offline Assisted Group Key ExchangeColin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang. 268-285 [doi]
- Function-Dependent Commitments for Verifiable Multi-party ComputationLucas Schabhüser, Denis Butin, Denise Demirel, Johannes Buchmann 0001. 289-307 [doi]
- On Constructing Pairing-Free Identity-Based EncryptionsXin Wang, Bei Liang, Shimin Li, Rui Xue. 308-327 [doi]
- Multi-key Homomorphic Proxy Re-EncryptionSatoshi Yasuda, Yoshihiro Koseki, Ryo Hiromasa, Yutaka Kawai. 328-346 [doi]
- Verifiable Decryption for Fully Homomorphic EncryptionFucai Luo, Kunpeng Wang. 347-365 [doi]
- Platform-Independent Secure Blockchain-Based Voting SystemBin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au. 369-386 [doi]
- Privacy in Crowdsourcing: A Systematic ReviewAbdulwhab Alkharashi, Karen Renaud. 387-400 [doi]
- Anonymous yet Traceable Strong Designated Verifier SignatureVeronika Kuchta, Rajeev Anand Sahu, Vishal Saraswat, Gaurav Sharma 0006, Neetu Sharma, Olivier Markowitch. 403-421 [doi]
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsMasahito Ishizaka, Kanta Matsuura. 422-441 [doi]
- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its ImplementationKeita Emura, Takuya Hayashi 0001. 442-460 [doi]
- Fast Flux Service Network Detection via Data Mining on Passive DNS TrafficPierangelo Lombardo, Salvatore Saeli, Federica Bisio, Davide Bernardi, Danilo Massa. 463-480 [doi]
- Beyond Cookie Monster Amnesia: Real World Persistent Online TrackingNasser Mohammed Al-Fannah, Wanpeng Li, Chris J. Mitchell. 481-501 [doi]
- Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous AssessmentCarolina Adaros Boye, Paul Kearney, Mark Josephs. 502-519 [doi]