The 10 papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections on applied cryptography; privacy; formal methods for security and trust; and systems security.
Applied Cryptography.- An Aggregate Signature with Pre-Communication in the Plain Public Key Model.- The Adversary Capabilities In Practical Byzantine Fault Tolerance.- Privacy.- Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.- Efficient permutation protocol for MPC in the head.- Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF 78.- Formal Methods for Security and Trust.- Secure Implementation of a Quantum-Future GAKE Protocol.- Deciding a Fragment of (alpha, beta)-Privacy.- Systems Security.- TLS beyond the broker: Enforcing ne-grained security and trust in publish/subscribe environments for IoT.- Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.- Towards Decentralized and Provably Secure Cross-Domain Solutions.