Abstract is missing.
- Analysis of a Consent Management Specification and Prototype Under the GDPRJonas Palm, Meiko Jensen. 3-17 [doi]
- No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support WebsitesPhilippe Mangeard, Xiufen Yu, Mohammad Mannan, Amr M. Youssef. 18-36 [doi]
- From Whistle to Echo: Data Leaks in Web-Based Whistleblowing ChannelsEsko Vuorinen, Panu Puhtila, Sampsa Rauti, Ville Leppänen. 37-53 [doi]
- Small Private Key Attack Against a Family of RSA-Like CryptosystemsPaul Cotan, George Teseleanu. 57-72 [doi]
- Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-ServiceAmirreza Hamidi, Hossein Ghodosi. 73-86 [doi]
- Smart Noise Detection for Statistical Disclosure AttacksMarc Roßberger, Dogan Kesdogan. 87-103 [doi]
- Cybersecurity Challenges and Smart Technology Adoption in Norwegian Livestock FarmingKarianne Kjønås, Gaute Wangen. 107-125 [doi]
- Mean Value Analysis of Critical Attack Paths with Multiple ParametersRajendra Patil, Viktoria Fodor, Mathias Ekstedt. 126-143 [doi]
- RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAMMordechai Guri. 144-161 [doi]
- Legal Considerations on Gray Zone Operations - From a Norwegian PerspectiveLars Berg, Kirsi Helkala, André Årnes. 162-181 [doi]
- Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution SystemsMario Lins, René Mayrhofer, Michael Roland 0001, Alastair R. Beresford. 185-203 [doi]
- DIPSAUCE: Efficient Private Stream Aggregation Without Trusted PartiesJoakim Brorsson, Martin Gunnarsson. 204-222 [doi]
- What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data TypesVera Schmitt, Daniel Sivizaca Conde, Premtim Sahitaj, Sebastian Möller 0001. 223-242 [doi]
- Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time PackersThorsten Jenke, Elmar Padilla, Lilli Bruckschen. 245-262 [doi]
- A Self-forming Community Approach for Intrusion Detection in Heterogeneous NetworksPhilipp Eichhammer, Hans P. Reiser. 263-280 [doi]
- To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on StickersSamantha Klier, Harald Baier. 281-303 [doi]
- A More Secure Split: Enhancing the Security of Privacy-Preserving Split LearningTanveer Khan, Khoa Nguyen 0005, Antonis Michalas. 307-329 [doi]
- Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPUTianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, Yulian Sun. 330-349 [doi]