|
Privacy and Identity Management |
|
|
|
An Efficient Self-blindable Attribute-Based Credential Scheme |
|
|
3 | (18) |
|
|
|
|
Real Hidden Identity-Based Signatures |
|
|
21 | (18) |
|
|
|
|
BehavioCog: An Observation Resistant Authentication Scheme |
|
|
39 | (20) |
|
|
|
|
|
|
Updatable Tokenization: Formal Definitions and Provably Secure Constructions |
|
|
59 | (20) |
|
|
|
Eduarda Freire-Stogbuchner |
|
|
|
Privacy and Data Processing |
|
|
|
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates |
|
|
79 | (19) |
|
|
|
|
|
|
Outsourcing Medical Dataset Analysis: A Possible Solution |
|
|
98 | (26) |
|
|
|
|
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation |
|
|
124 | (21) |
|
|
|
|
Cryptographic Primitives and API's |
|
|
|
A Provably Secure PKCS#11 Configuration Without Authenticated Attributes |
|
|
145 | (18) |
|
|
A Post-quantum Digital Signature Scheme Based on Supersingular Isogenics |
|
|
163 | (19) |
|
|
|
|
|
|
Optimally Sound Sigma Protocols Under DCRA |
|
|
182 | (22) |
|
|
Economically Optimal Variable Tag Length Message Authentication |
|
|
204 | (23) |
|
|
|
|
Vulnerabilities and Exploits |
|
|
|
PEEP: Passively Eavesdropping Private Input via Brainwave Signals |
|
|
227 | (20) |
|
|
|
|
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript |
|
|
247 | (21) |
|
|
|
|
|
Attacks on Secure Logging Schemes |
|
|
268 | (17) |
|
|
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS |
|
|
285 | (17) |
|
|
|
|
|
|
Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store |
|
|
302 | (8) |
|
|
|
Short Paper: Addressing Sophisticated Email Attacks |
|
|
310 | (11) |
|
|
|
|
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin |
|
|
321 | (19) |
|
|
|
|
|
Trust Is Risk: A Decentralized Financial Trust Platform |
|
|
340 | (17) |
|
Orfeas Stefanos Thyfronitis Litos |
|
|
|
A Smart Contract for Boardroom Voting with Maximum Voter Privacy |
|
|
357 | (19) |
|
|
|
|
Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies |
|
|
376 | (17) |
|
|
|
|
|
Short Paper: Service-Oriented Sharding for Blockchains |
|
|
393 | (12) |
|
|
|
|
Security of Internet Protocols |
|
|
|
The Security of NTP's Datagram Protocol |
|
|
405 | (19) |
|
|
|
|
|
|
|
Short Paper: On Deployment of DNS-Based Security Enhancements |
|
|
424 | (13) |
|
|
|
|
|
A Practical Multivariate Blind Signature Scheme |
|
|
437 | (18) |
|
|
|
Mohamed Saied Emam Mohamed |
|
|
Efficient Round-Optimal Blind Signatures in the Standard Model |
|
|
455 | (22) |
|
|
Searching and Processing Private Data |
|
|
|
Secure Multiparty Computation from SGX |
|
|
477 | (21) |
|
|
|
|
|
|
|
|
Efficient No-dictionary Verifiable Searchable Symmetric Encryption |
|
|
498 | (19) |
|
|
|
Faster Homomorphic Evaluation of Discrete Fourier Transforms |
|
|
517 | (16) |
|
|
|
|
|
|
Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers |
|
|
533 | (9) |
|
|
|
Unilaterally-Authenticated Key Exchange |
|
|
542 | (19) |
|
|
|
Formal Modeling and Verification for Domain Validation and ACME |
|
|
561 | (18) |
|
|
|
|
Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps |
|
|
579 | (22) |
|
|
|
|
|
Privacy in Data Storage and Retrieval |
|
|
|
Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage |
|
|
601 | (20) |
|
|
|
|
A Simpler Rate-Optimal CPIR Protocol |
|
|
621 | (20) |
|
|
|
|
|
Accountability and Integrity for Data Management Using Blockchains |
|
|
641 | (2) |
|
|
|
|
|
|
|
The Amount as a Predictor of Transaction Fraud |
|
|
643 | (1) |
|
|
|
Σ-State Authentication Language, an Alternative to Bitcoin Script |
|
|
644 | (2) |
|
|
Broker-Mediated Trade Finance with Blockchains |
|
|
646 | (1) |
|
|
|
|
OpenTimestamps: Securing Software Updates Using the Bitcoin Blockchain |
|
|
647 | (2) |
|
|
Author Index |
|
649 | |