Abstract is missing.
- IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward RateJunming Ke, Pawel Szalachowski, Jianying Zhou 0001, Qiuliang Xu, Zheng Yang. 3-24 [doi]
- Full Database Reconstruction with Access and Search Pattern LeakageEvangelia Anna Markatou, Roberto Tamassia. 25-43 [doi]
- Cube Cryptanalysis of Round-Reduced ACORNJingchun Yang, Meicheng Liu, Dongdai Lin. 44-64 [doi]
- Auditable Compressed StorageIraklis Leontiadis, Reza Curtmola. 67-86 [doi]
- Decentralized Evaluation of Quadratic Polynomials on Encrypted DataChloé Hébant, Duong Hieu Phan, David Pointcheval. 87-106 [doi]
- Robust Distributed Pseudorandom Functions for mNP Access StructuresBei Liang, Aikaterini Mitrokotsa. 107-126 [doi]
- Can Today's Machine Learning Pass Image-Based Turing Tests?Apostolis Zarras, Ilias Gerostathopoulos, Daniel Méndez Fernández. 129-148 [doi]
- PD-ML-Lite: Private Distributed Machine Learning from Lightweight CryptographyMaksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas. 149-167 [doi]
- Code-Based Zero Knowledge PRF ArgumentsCarlo Brunetta, Bei Liang, Aikaterini Mitrokotsa. 171-189 [doi]
- On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local RevocationYanhua Zhang, Yupu Hu, Qikun Zhang, Huiwen Jia. 190-208 [doi]
- When the Attacker Knows a Lot: The GAGA Graph AnonymizerArash Alavi, Rajiv Gupta 0001, Zhiyun Qian. 211-230 [doi]
- Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range QueriesEvangelia Anna Markatou, Roberto Tamassia. 231-251 [doi]
- Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain ListsWalter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda. 255-276 [doi]
- Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of CryptojackingPanagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos. 277-296 [doi]
- LightSense: A Novel Side Channel for Zero-permission Mobile User TrackingQuanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang. 299-318 [doi]
- Robust Covert Channels Based on DRAM Power ConsumptionThales Bandiera Paiva, Javier Navaridas, Routo Terada. 319-338 [doi]
- Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware TracesCarter Yagemann, Salmin Sultana, Li Chen, Wenke Lee. 341-359 [doi]
- An Analysis of Malware Trends in Enterprise NetworksAbbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda. 360-380 [doi]
- L(a)ying in (Test)Bed - How Biased Datasets Produce Impractical Results for Actual Malware Families' ClassificationTamy Beppler, Marcus Botacin, Fabricio Ceschin, Luiz E. S. Oliveira, André Grégio. 381-401 [doi]
- Automated Reconstruction of Control Logic for Programmable Logic Controller ForensicsSyed Ali Qasim, Juan Lopez Jr., Irfan Ahmed. 402-422 [doi]
- Secure Stern Signatures in Quantum Random Oracle ModelHanwen Feng, Jianwei Liu, Qianhong Wu. 425-444 [doi]
- Adding Linkability to Ring Signatures with One-Time SignaturesXueli Wang, Yu Chen, Xuecheng Ma. 445-464 [doi]
- Cryptographic Authentication from the IrisSailesh Simhadri, James Steel, Benjamin Fuller. 465-485 [doi]