| 2018 | Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers Srdjan Capkun, Sherman S. M. Chow |
| 2017 | (Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation. Angela Jäschke, Frederik Armknecht |
| 2017 | A New Approach to Deanonymization of Unreachable Bitcoin Nodes. Indra Deep Mastan, Souradyuti Paul |
| 2017 | A New Direction for Research on Data Origin Authentication in Group Communication. Robert Annessi, Tanja Zseby, Joachim Fabini |
| 2017 | A New Secure Matrix Multiplication from Ring-LWE. Lihua Wang, Yoshinori Aono, Le Trieu Phong |
| 2017 | A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems. Mohammad Hossein Chinaei, Diethelm Ostry, Vijay Sivaraman |
| 2017 | A Paged Domain Name System for Query Privacy. Daniele Enrico Asoni, Samuel Hitz, Adrian Perrig |
| 2017 | A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network. Tomer Ashur, Jeroen Delvaux, Sanghan Lee, Pieter Maene, Eduard Marin, Svetla Nikova, Oscar Reparaz, Vladimir Rozic, Dave Singelée, Bohan Yang, Bart Preneel |
| 2017 | A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without Pairing in the Random Oracle Model. S. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandu Rangan |
| 2017 | An Efficient Attribute-Based Authenticated Key Exchange Protocol. Suvradip Chakraborty, Y. Sreenivasa Rao, Chandrasekaran Pandu Rangan |
| 2017 | Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin. Mayur Punekar, Qutaibah M. Malluhi, Yvo Desmedt, Yongge Wang |
| 2017 | Forward-Security Under Continual Leakage. Mihir Bellare, Adam O'Neill, Igors Stepanovs |
| 2017 | Modelling Traffic Analysis in Home Automation Systems. Frederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, Christoph Sorge |
| 2017 | Multi-client Predicate-Only Encryption for Conjunctive Equality Tests. Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker |
| 2017 | Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps. Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu |
| 2017 | On the Security of Frequency-Hiding Order-Preserving Encryption. Matteo Maffei, Manuel Reinert, Dominique Schröder |
| 2017 | Out of the Dark: UI Redressing and Trustworthy Events. Marcus Niemietz, Jörg Schwenk |
| 2017 | Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN. Daniele Antonioli, Sandra Deepthy Siby, Nils Ole Tippenhauer |
| 2017 | Privacy-Preserving Whole-Genome Variant Queries. Daniel Demmler, Kay Hamacher, Thomas Schneider, Sebastian Stammler |
| 2017 | Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough? Elena Pagnin, Jing Liu, Aikaterini Mitrokotsa |
| 2017 | Secure Code Updates for Smart Embedded Devices Based on PUFs. Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, Xiaobo Chu, Dengguo Feng |
| 2017 | Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure. Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui |
| 2017 | Subset Predicate Encryption and Its Applications. Jonathan Katz, Matteo Maffei, Giulio Malavolta, Dominique Schröder |
| 2017 | Tightly-Secure PAK(E). José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Sala, Marjan Skrobot |
| 2017 | Towards Attribute-Based Credentials in the Cloud. Stephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks |
| 2017 | Towards a Smart Contract-Based, Decentralized, Public-Key Infrastructure. Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias |
| 2017 | Two Cents for Strong Anonymity: The Anonymous Post-office Protocol. Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz |
| 2017 | Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures. Xavier Bultel, Pascal Lafourcade |
| 2017 | VisAuth: Authentication over a Visual Channel Using an Embedded Image. Jack Sturgess, Ivan Martinovic |