The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 03 - May/June (vol. 15)
ISSN: 1540-7993

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 1-2
From the Editors

Masthead (PDF)

pp. 5
Interview
Guest Editors' Introduction

A Vote of Confidence? (HTML)

Josh Benaloh , Microsoft Research
Peter Y.A. Ryan , University of Luxembourg
Steve Schneider , University of Surrey
Vanessa Teague , University of Melbourne
pp. 12-13
Electronic Voting

An Efficient E2E Verifiable E-voting System without Setup Assumptions (Abstract)

Aggelos Kiayias , University of Edinburgh
Thomas Zacharias , University of Edinburgh
Bingsheng Zhang , Lancaster University
pp. 14-23

Nothing Comes for Free: How Much Usability Can You Sacrifice for Security? (Abstract)

Oksana Kulyk , Technische Universität Darmstadt
Stephan Neumann , Technische Universität Darmstadt
Jurlind Budurushi , Technische Universität Darmstadt
Melanie Volkamer , Technische Universität Darmstadt
pp. 24-29
Electronic Voting

Long-Term Threats to Ballot Privacy (Abstract)

Jeroen van de Graaf , Universidade Federal de Minas Gerais
pp. 40-47

When Is an Election Verifiable? (Abstract)

Philip B. Stark , University of California, Berkeley
pp. 48-50
Secure Proximity Verification
Cloud Security

Rethinking Security in the Era of Cloud Computing (Abstract)

Jay Aikat , University of North Carolina at Chapel Hill
Aditya Akella , University of Wisconsin at Madison
Jeffrey S. Chase , Duke University
Ari Juels , Cornell Tech
Michael K. Reiter , University of North Carolina at Chapel Hill
Thomas Ristenpart , Cornell Tech
Vyas Sekar , Carnegie Mellon University
Michael Swift , University of Wisconsin at Madison
pp. 60-69
Spotlight

ACM CCS 2016 Interviews, Part 2 (HTML)

Ahmad-Reza Sadeghi , Technische Universität Darmstadt
Shaza Zeitouni , Technische Universität Darmstadt
pp. 70-76

IEEE Computer Society (PDF)

pp. 77
Privacy Interests

The Market's Law of Privacy: Case Studies in Privacy and Security Adoption (Abstract)

Chetan Gupta , University of California, Berkeley, School of Law
pp. 78-83
Sociotechnical Security and Privacy

User Anonymity on Twitter (Abstract)

Keith W. Ross , New York University
Justin Cappos , New York University
pp. 84-87
Education

Cybersecurity Education and Assessment in EDURange (Abstract)

Richard Weiss , The Evergreen State College
Franklyn Turbak , Wellesley College
Jens Mache , Lewis & Clark College
pp. 90-95
Last Word

Jurisdiction and the Internet (HTML)

Steven M. Bellovin , Columbia University
pp. 96
87 ms
(Ver 3.3 (11022016))