


default search action
DPM/CBT@ESORICS 2019: Luxembourg
- Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov

, Joaquín García-Alfaro
:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings. Lecture Notes in Computer Science 11737, Springer 2019, ISBN 978-3-030-31499-6
DPM Workshop: Privacy Preserving Data Analysis
- Marc Joye, Fabien A. P. Petitcolas

:
PINFER: Privacy-Preserving Inference - Logistic Regression, Support Vector Machines, and More, over Encrypted Data. 3-21 - Fatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg

, Edgar R. Weippl
, Alessio Bertone
:
Towards Data Anonymization in Data Mining via Meta-heuristic Approaches. 39-48 - Eyal Nussbaum, Michael Segal:

Skiplist Timing Attack Vulnerability. 49-58
DPM Workshop: Field/Lab Studies
- Tobias Urban

, Dennis Tatang, Martin Degeling
, Thorsten Holz, Norbert Pohlmann:
A Study on Subject Data Access in Online Advertising After the GDPR. 61-79 - Suzan Ali, Tousif Osman, Mohammad Mannan, Amr M. Youssef:

On Privacy Risks of Public WiFi Captive Portals. 80-98 - Devris Isler

, Alptekin Küpçü
, Aykut Coskun:
User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication. 99-117
DPM Workshop: Privacy by Design and Data Anonymization
- Vicenç Torra

, Julián Salas:
Graph Perturbation as Noise Graph Addition: A New Perspective for Graph Anonymization. 121-137 - Christian Burkert

, Hannes Federrath:
Towards Minimising Timestamp Usage In Application Software - A Case Study of the Mattermost Application. 138-155 - Hibiki Ono, Yoshifumi Manabe

:
Card-Based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations. 156-173
CBT Workshop: Lightning Networks and Level 2
- Marc Leinweber

, Matthias Grundmann, Leonard Schönborn, Hannes Hartenstein:
TEE-Based Distributed Watchtowers for Fraud Protection in the Lightning Network. 177-194 - Georgia Avarikioti, Rolf Scheuner, Roger Wattenhofer:

Payment Networks as Creation Games. 195-210 - Hisham S. Galal

, Muhammad ElSheikh
, Amr M. Youssef:
An Efficient Micropayment Channel on Ethereum. 211-218 - Jean-Yves Zie, Jean-Christophe Deneuville, Jérémy Briffaut, Benjamin Nguyen:

Extending Atomic Cross-Chain Swaps. 219-229
CBT Workshop: Smart Contracts and Applications
- Massimo Bartoletti, Letterio Galletta

, Maurizio Murgia
:
A Minimal Core Calculus for Solidity Contracts. 233-243 - Alexander Chepurnoy, Amitabh Saxena:

Multi-stage Contracts in the UTXO Model. 244-254 - Michael Fröwis, Rainer Böhme:

The Operational Cost of Ethereum Airdrops. 255-270 - Arjun Choudhry

, Ikechukwu Dimobi, Zachary M. Isaac Gould
:
Blockchain Driven Platform for Energy Distribution in a Microgrid. 271-288 - Joran J. Honig

, Maarten H. Everts
, Marieke Huisman
:
Practical Mutation Testing for Smart Contracts. 289-303
CBT Workshop: Payment Systems, Privacy and Mining
- Georgia Avarikioti, Kenan Besic, Yuyi Wang, Roger Wattenhofer:

Online Payment Network Design. 307-320 - Kazim Rifat Özyilmaz

, Nazmi Berhan Kongel, Ali Erhat Nalbant, Ahmet Özcan:
A Multi-protocol Payment System to Facilitate Financial Inclusion. 321-335 - Shahla Atapoor

, Karim Baghery
:
Simulation Extractability in Groth's zk-SNARK. 336-354 - Rujia Li, David Galindo, Qi Wang

:
Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts. 355-371 - George Bissias, David Thibodeau, Brian Neil Levine:

Bonded Mining: Difficulty Adjustment by Miner Commitment. 372-390 - Aryaz Eghbali

, Roger Wattenhofer:
12 Angry Miners. 391-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














