Abstract is missing.
- A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-AppDavid Harborth, Sebastian Pape 0001. 3-19 [doi]
- Deriving and Using Synthetic Consequences for Privacy Risk ModelingStuart S. Shapiro. 20-33 [doi]
- Enhanced Privacy in Smart Workplaces: Employees' Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart WatchesAlexander Richter, Patrick Kühtreiber, Delphine Reinhardt. 34-50 [doi]
- DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoringAlexandre Dey, Eric Totel, Benjamin Costé. 53-69 [doi]
- FOCUS: Frequency Based Detection of Covert Ultrasonic SignalsWouter Hellemans, Md Masoom Rabbani, Jo Vliegen, Nele Mentens. 70-86 [doi]
- Passive, Transparent, and Selective TLS Decryption for Network Security MonitoringFlorian Wilkens, Steffen Haas, Johanna Amann, Mathias Fischer 0001. 87-105 [doi]
- A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship CircumventionMartin Fejrskov, Emmanouil Vasilomanolakis, Jens Myrup Pedersen. 109-125 [doi]
- RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic FeaturesPeishuai Sun, Shuhao Li, Jiang Xie 0004, Hongbo Xu, Zhenyu Cheng 0001, Rui Qin. 126-141 [doi]
- Evaluation of Circuit Lifetimes in TorKevin Köster, Matthias Marx, Anne Kunstmann, Hannes Federrath. 142-157 [doi]
- D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud StorageMark Vella, Christian Colombo 0001. 161-178 [doi]
- Robust PDF Files Forensics Using Coding StyleSupriya Adhatarao, Cédric Lauradoux. 179-195 [doi]
- Light-Weight File Fragments Classification Using Depthwise Separable ConvolutionsKunwar Muhammed Saaim, Muhamad Felemban, Saleh Alsaleh, Ahmad Almulhem. 196-211 [doi]
- Novel Approaches for the Development of Trusted IoT EntitiesDavide Ferraris, M. Carmen Fernández Gago, Javier López 0001. 215-230 [doi]
- Requirements and Secure Serialization for Selective Disclosure Verifiable CredentialsVasilis Kalos, George C. Polyzos. 231-247 [doi]
- UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update PropertiesShaoqiang Wu, Chunfu Jia, Ding Wang 0002. 251-269 [doi]
- CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware FeatureBingnan Zhong, ZiCheng Wang, Yinggang Guo, Qingkai Zeng. 270-286 [doi]
- Usability Insights from Establishing TLS ConnectionsLydia Kraus, Matej Grabovský, Martin Ukrop, Katarína Galanská, Vashek Matyás. 289-305 [doi]
- Usability of Antivirus Tools in a Threat Detection ScenarioMichael Körber, Anatoli Kalysch, Werner Massonne, Zinaida Benenson. 306-322 [doi]
- Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User ConfigurationsChristian Burkert, Johanna Ansohn McDougall, Hannes Federrath. 323-339 [doi]
- Greedy Networking in Cryptocurrency BlockchainSimeon Wuthier, Pranav Chandramouli, Xiaobo Zhou 0002, Sang-Yoon Chang. 343-359 [doi]
- Towards Supporting Attribute-Based Access Control in Hyperledger Fabric BlockchainAmshumaan Pericherla, Proteet Paul, Shamik Sural, Jaideep Vaidya, Vijay Atluri. 360-376 [doi]
- AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android AppsArdalan Foroughipour, Natalia Stakhanova, Farzaneh Abazari, Bahman Sistany. 379-397 [doi]
- One Light, One App: Tackling a Common Misperception Causing Breach of User PrivacyEfi Siapiti, Ioanna Dionysiou, K. Harald Gjermundrød. 398-411 [doi]
- Double-X: Towards Double-Cross-Based Unlock Mechanism on SmartphonesWenjuan Li 0001, Jiao Tan, Nan Zhu. 412-428 [doi]
- Post-Quantum Cheating Detectable Private Information RetrievalLin Zhu, Changlu Lin, Fuchun Lin, Liang Feng Zhang. 431-448 [doi]
- Anonymous Trusted Data Relocation for TEEsVasco Guita, Daniel Andrade, João Nuno Silva, Miguel Correia 0001. 449-466 [doi]
- Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive QueriesTianci Li, Jiaojiao Wu, Jianfeng Wang. 467-485 [doi]
- Upside Down: Exploring the Ecosystem of Dark Web Data MarketsBogdan Covrig, Enrique Barrueco Mikelarena, Constanta Rosca, Catalina Goanta, Gerasimos Spanakis, Apostolis Zarras. 489-506 [doi]
- An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer NullificationYue Yu, Xiaoqi Jia, Xun An, Shengzhi Zhang. 507-523 [doi]