Abstract is missing.
- SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing CountriesChris Hicks, Vasilios Mavroudis, Jon Crowcroft. 3-23 [doi]
- A Hierarchical Watermarking Scheme for PRFs from Standard Lattice AssumptionsYanmin Zhao, Yang Wang, Siu-Ming Yiu, Yu Liu, Meiqin Wang. 24-51 [doi]
- Evaluating the Future Device Security Risk Indicator for Hundreds of IoT DevicesPascal Oser, Felix Engelmann, Stefan Lüders, Frank Kargl. 52-70 [doi]
- Server-Supported Decryption for Mobile DevicesJohanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk. 71-81 [doi]
- Software Vulnerability Detection via Multimodal Deep LearningXin Zhou, Rakesh M. Verma. 85-103 [doi]
- Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation MapsGiacomo Iadarola, Francesco Mercaldo, Fabio Martinelli, Antonella Santone. 104-114 [doi]
- 2M: A General Method to Perform Various Data Analysis Tasks from a Differentially Private SketchFlorimond Houssiau, Vincent Schellekens, Antoine Chatalic, Shreyas Kumar Annamraju, Yves-Alexandre de Montjoye. 117-135 [doi]
- JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java LanguageLuca Buccioli, Stefano Cristalli, Edoardo Vignati, Lorenzo Nava, Daniele Badagliacca, Danilo Bruschi, Long Lu, Andrea Lanzi. 136-155 [doi]
- FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion DetectionPan Wang, Zeyi Li, Xiaokang Zhou, Chunhua Su, Weizheng Wang. 156-174 [doi]
- The Relevance of Consent in the Digital Age: A Consideration of Its Origins and Its Fit for Digital ApplicationMarietjie Botes. 177-188 [doi]
- HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial NetworksFangyi Yu, Miguel Vargas Martin. 189-198 [doi]