Abstract is missing.
- Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice AssumptionsMaharage Nisansala Sevwandi Perera, Takeshi Koshiba. 3-19 [doi]
- Modular Verification of Sequential Composition for Private Channels in Maude-NPAFan Yang, Santiago Escobar, Catherine A. Meadows, José Meseguer. 20-36 [doi]
- A Spark Is Enough in a Straw World: A Study of Websites Password Management in the WildSimone Raponi, Roberto Di Pietro. 37-53 [doi]
- A Fast and Scalable Fragmentation Algorithm for Data Protection Using Multi-storage over Independent LocationsKatarzyna Kapusta, Gérard Memmi. 54-69 [doi]
- Cyber Insurance Against Electronic Payment Service Outages - A Document Study of Terms and Conditions from Electronic Payment Service Providers and Insurance CompaniesUlrik Franke. 73-84 [doi]
- Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree LibraryRavi Jhawar, Karim Lounis, Sjouke Mauw, Yunior Ramírez-Cruz. 85-101 [doi]
- Tux: Trust Update on Linux BootingSuhho Lee, Seehwan Yoo. 105-121 [doi]
- Verifiable Outsourcing of Computations Using Garbled OnionsTahsin C. M. Dönmez. 122-137 [doi]