Abstract is missing.
- Privacy-Preserving Multi-Party Access ControlMina Sheikhalishahi, Gamze Tillem, Zekeriya Erkin, Nicola Zannone. 1-13 [doi]
- Private Set Intersection with Linear Communication from General AssumptionsBrett Hemenway Falk, Daniel Noble, Rafail Ostrovsky. 14-25 [doi]
- DURASIFT: A Robust, Decentralized, Encrypted Database Supporting Private Searches with Complex Policy ControlsBrett Hemenway Falk, Steve Lu, Rafail Ostrovsky. 26-36 [doi]
- There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One ZeroWilliam Black, Ryan Henry. 37-49 [doi]
- zksk: A Library for Composable Zero-Knowledge ProofsWouter Lueks, Bogdan Kulynych, Jules Fasquelle, Simon Le Bail-Collet, Carmela Troncoso. 50-54 [doi]
- End-to-End Secure Mobile Group Messaging with Conversation Integrity and DeniabilityMichael Schliep, Nicholas Hopper. 55-73 [doi]
- Anatomy of Commercial IMSI Catchers and DetectorsShinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert. 74-86 [doi]
- When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain NamesRichard Roberts, Dave Levin. 87-92 [doi]
- How Much Does GenoGuard Really "Guard"?: An Empirical Analysis of Long-Term Security for Genomic DataBristena Oprisanu, Christophe Dessimoz, Emiliano De Cristofaro. 93-105 [doi]
- Balancing Security and Privacy in Genomic Range QueriesXuhua Ding, Ercan Ozturk, Gene Tsudik. 106-110 [doi]
- Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based PrivacyEugene Bagdasaryan, Griffin Berlstein, Jason Waterman, Eleanor Birrell, Nate Foster, Fred B. Schneider, Deborah Estrin. 111-124 [doi]
- Privacy Protection in Distributed Fingerprint-based AuthenticationSwe Geng, Georgia Giannopoulou, Maëlle Kabir-Querrec. 125-129 [doi]
- Parking Tickets for Privacy-Preserving Pay-by-Phone ParkingRicard Borges, Francesc Sebé. 130-134 [doi]
- MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application FingerprintingNikolay Matyunin, Yujue Wang, Tolga Arul, Kristian Kullmann, Jakub Szefer, Stefan Katzenbeisser 0001. 135-149 [doi]
- State of the Sandbox: Investigating macOS Application SecurityMaximilian Blochberger, Jakob Rieck, Christian Burkert, Tobias Mueller, Hannes Federrath. 150-161 [doi]
- Digital-PASS: A Simulation-based Approach to Privacy EducationKambiz Ghazinour, Ken Messner, Sean Scarnecchia, David Selinger. 162-174 [doi]
- Can Privacy Nudges be Tailored to Individuals' Decision Making and Personality Traits?Logan Warberg, Alessandro Acquisti, Douglas C. Sicker. 175-197 [doi]
- Efficiently Stealing your Machine Learning ModelsRobert Nikolai Reith, Thomas Schneider 0003, Oleksandr Tkachenko. 198-210 [doi]
- Anonymity and Privacy in Bitcoin Escrow TradesFarida Sabry, Wadha Labda, Aiman Erbad, Husam Al Jawaheri, Qutaibah M. Malluhi. 211-220 [doi]