Machine Learning.- Privacy-Enhanced Machine Learning with Functional Encryption.- Towards Secure and Efficient Outsourcing of Machine Learning Classification.- Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data.- A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks.- Information Leakage.- The Leakage-Resilience Dilemma.- A Taxonomy of Attacks using BGP Blackholing.- Local Obfuscation Mechanisms for Hiding Probability Distributions.- A First Look into Privacy Leakage in 3D Mixed Reality Data.- Signatures and Re-encryption.- Flexible Making Authentication Suitable for Real-Time Environments.- A Dynamic & Revocable Group Merkle Signature.- Puncturable Proxy Re-Encryption supporting to Group Messaging Service.- Generic Traceable Proxy Re-Encryption and Accountable Extension in Consensus Network.- Side Channels.- Side-Channel Aware Fuzzing.- Read Arbitrary Memory over Network.- Automated Verification of Higher-Order Masking in Presence of Physical Defaults.- Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems.- Formal Modelling and Verification.- A Formal Model for Checking Cryptographic API Usage in JavaScript.- Contingent Payments on a Public Models and Reductions for Automated Verification.- Symbolic Analysis of Terrorist Fraud Resistance.- Secure Communication Channel TLS 1.3 (over TCP Fast Open) vs. QUIC.- Attacks.- Where to Look for What You See Is What You Sign? User Confusion in Transaction Security.- On the Security and Applicability of Fragile Camera Fingerprints.- Attacking Speaker Recognition Systems with Phoneme Morphing.- Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks.- A Framework for Evaluating Security in the Presence of Signal Injection Attacks.- Secure Protocols.- Formalizing and Proving Privacy Properties of Voting Protocols using Alpha-Beta Privacy.- Protecting Privacy in Crowdsourced Spectrum Allocation.- Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity.- Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing.- Useful Tools.- Finding Flaws from Password Authentication Code in Android Apps.- Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.- An Interactive Customizable Anonymization Tool.- Monitoring the GDPR.- Blockchain and Smart Contracts.- Incentives for Harvesting Attack in Proof of Work mining pools.- A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.- A Concolic Execution System for Developing Secure Smart Contracts.- Practical Data Feed Service for Smart Contracts.- Towards a Marketplace for Secure Outsourced Computations.