


default search action
DPM/CBT@ESORICS 2018: Barcelona, Spain
- Joaquín García-Alfaro

, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings. Lecture Notes in Computer Science 11025, Springer 2018, ISBN 978-3-030-00304-3
CBT Workshop: Smart Contracts
- Hisham S. Galal

, Amr M. Youssef:
Succinctly Verifiable Sealed-Bid Auction Smart Contract. 3-19 - Macià Mut Puigserver, María Magdalena Payeras Capellà, Miquel A. Cabot-Nadal:

Blockchain-Based Fair Certified Notifications. 20-37 - Rick Klomp, Andrea Bracciali:

On Symbolic Verification of Bitcoin's script Language. 38-56 - Alexander Chepurnoy, Vasily Kharin

, Dmitry Meshkov:
Self-reproducing Coins as Universal Turing Machine. 57-64
CBT Workshop: Second Layer, Off-chain Transactions and Transparency
- Dmytro Piatkivskyi, Mariusz Nowostawski:

Split Payments in Payment Networks. 67-75 - Georgia Avarikioti, Gerrit Janssen, Yuyi Wang, Roger Wattenhofer:

Payment Network Design with Fees. 76-84 - Oliver Stengele

, Hannes Hartenstein:
Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption. 85-93 - Mustafa Al-Bassam, Sarah Meiklejohn:

Contour: A Practical System for Binary Transparency. 94-110
CBT Workshop: Consensus, Mining Pools and Performance
- Tommy Koens, Erik Poll:

What Blockchain Alternative Do You Need? 113-129 - Colin Boyd, Christopher Carr:

Valuable Puzzles for Proofs-of-Work. 130-139 - Mohiuddin Ahmed, Jinpeng Wei, Yongge Wang

, Ehab Al-Shaer:
A Poisoning Attack Against Cryptocurrency Mining Pools. 140-154 - George Bissias, Brian Neil Levine, David Thibodeau:

Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies. 155-172
CBT Workshop: Deadlocks, Attacks and Privacy
- Shira Werman, Aviv Zohar:

Avoiding Deadlocks in Payment Channel Networks. 175-187 - Felix Engelmann, Frank Kargl, Christoph Bösch:

Coloured Ring Confidential Transactions. 188-196 - Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:

Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper). 197-206
DPM Workshop: Privacy Assessment and Trust
- Majed Alshammari, Andrew Simpson

:
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis. 209-224 - Isabel Wagner

, Eerke A. Boiten:
Privacy Risk Assessment: From Art to Science, by Metrics. 225-241 - Constantin Catalin Dragan

, Mark Manulis
:
Bootstrapping Online Trust: Timeline Activity Proofs. 242-259
DPM Workshop: Private Data and Searches
- Martin Franke

, Ziad Sehili, Marcel Gladbach, Erhard Rahm:
Post-processing Methods for High Quality Privacy-Preserving Record Linkage. 263-278 - Bruno de C. Leal, Israel C. Vidal, Felipe T. Brito

, Juvêncio S. Nobre
, Javam C. Machado:
\delta -DOCA: Achieving Privacy in Data Streams. 279-295 - Avradip Mandal, John C. Mitchell

, Hart Montgomery, Arnab Roy:
Data Oblivious Genome Variants Search on Intel SGX. 296-310
DPM Workshop: Internet of Things
- Tom Lodge

, Andy Crabtree
, Anthony Brown
:
Developing GDPR Compliant Apps for the Edge. 313-328 - Max-Robert Ulbricht

, Frank Pallas
:
YaPPL - A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT Scenarios. 329-344 - Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou

:
PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution. 345-353
DPM Workshop: Privacy and Cryptography
- Marcel von Maltitz

, Georg Carle:
A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation. 357-372 - Stefan Wüller, Malte Breuer, Ulrike Meyer, Susanne Wetzel:

Privacy-Preserving Trade Chain Detection. 373-388 - Alberto Ibarrondo

, Melek Önen:
FHE-Compatible Batch Normalization for Privacy Preserving Deep Learning. 389-404
DPM Workshop: Future Internet
- Julián Salas, Vicenç Torra

:
A General Algorithm for k-anonymity on Dynamic Databases. 407-414 - Naoto Yanai

, Jason Paul Cruz:
On Security of Anonymous Invitation-Based System. 415-421 - Vicenç Torra

, Guillermo Navarro-Arribas:
Probabilistic Metric Spaces for Privacy by Design Machine Learning Algorithms: Modeling Database Changes. 422-430 - David Pàmies-Estrems

, Nesrine Kaaniche
, Maryline Laurent
, Jordi Castellà-Roca
, Joaquín García-Alfaro
:
Lifelogging Protection Scheme for Internet-Based Personal Assistants. 431-440

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














