Abstract is missing.
- On the Malleability of Bitcoin TransactionsMarcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek. 1-18 [doi]
- Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction FeesMalte Möser, Rainer Böhme. 19-33 [doi]
- ZombieCoin: Powering Next-Generation Botnets with BitcoinSyed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao. 34-48 [doi]
- Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-WorkJohn Tromp. 49-62 [doi]
- When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining PoolsAron Laszka, Benjamin Johnson, Jens Grossklags. 63-77 [doi]
- Issues in Designing a Bitcoin-like Community CurrencyDavid Vandervort, Dale E. Gaucas, Robert St. Jacques. 78-91 [doi]
- The Bitcoin Market Potential IndexGarrick Hileman. 92-93 [doi]
- Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical DirectionsEmily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, Tadayoshi Kohno. 94-111 [doi]
- Blindcoin: Blinded, Accountable Mixes for BitcoinLuke Valenta, Brendan Rowan. 112-126 [doi]
- Privacy-Enhancing Overlays in BitcoinSarah Meiklejohn, Claudio Orlandi. 127-141 [doi]
- Search-and-Compute on Encrypted DataJung Hee Cheon, Miran Kim, Myungsun Kim. 142-159 [doi]
- Accelerating SWHE Based PIRs Using GPUsWei Dai, Yarkin Doröz, Berk Sunar. 160-171 [doi]
- Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point ComputationsPille Pullonen, Sander Siim. 172-183 [doi]
- Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIRTancrède Lepoint, Mehdi Tibouchi. 184-193 [doi]
- Homomorphic Computation of Edit DistanceJung Hee Cheon, Miran Kim, Kristin E. Lauter. 194-212 [doi]
- HEtest: A Homomorphic Encryption Testing FrameworkMayank Varia, Sophia Yakoubov, Yang Yang. 213-230 [doi]
- Users' Privacy Concerns About Wearables - Impact of Form Factor, Sensors and Type of Data CollectedVivian Genaro Motti, Kelly Caine. 231-244 [doi]
- On Vulnerabilities of the Security Association in the IEEE 802.15.6 StandardMohsen Toorani. 245-260 [doi]
- Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented RealityPatrik Lantz, Bjorn Johansson, Martin Hell, Ben J. M. Smeets. 261-273 [doi]
- Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable ComputingKatharina Krombholz, Adrian Dabrowski, Matthew Smith, Edgar R. Weippl. 274-280 [doi]
- Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google GlassDhruv Kumar Yadav, Beatrice Ionascu, Sai Vamsi Krishna Ongole, Aditi Roy, Nasir Memon. 281-297 [doi]
- Glass OTP: Secure and Convenient User Authentication on Google GlassPan Chan, Tzipora Halevi, Nasir Memon. 298-308 [doi]