Advertisement

Data Privacy Management, Cryptocurrencies and Blockchain Technology

ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26–27, 2019, Proceedings

  • Cristina Pérez-Solà
  • Guillermo Navarro-Arribas
  • Alex Biryukov
  • Joaquin Garcia-Alfaro
Conference proceedings DPM 2019, CBT 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11737)

Also part of the Security and Cryptology book sub series (LNSC, volume 11737)

Table of contents

  1. Front Matter
    Pages i-xv
  2. DPM Workshop: Privacy Preserving Data Analysis

    1. Front Matter
      Pages 1-1
    2. Marc Joye, Fabien Petitcolas
      Pages 3-21
    3. Navoda Senavirathne, Vicenç Torra
      Pages 22-38 Open Access
    4. Fatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg, Edgar Weippl, Alessio Bertone
      Pages 39-48
    5. Eyal Nussbaum, Michael Segal
      Pages 49-58
  3. DPM Workshop: Field/Lab Studies

    1. Front Matter
      Pages 59-59
    2. Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann
      Pages 61-79
    3. Suzan Ali, Tousif Osman, Mohammad Mannan, Amr Youssef
      Pages 80-98
  4. DPM Workshop: Privacy by Design and Data Anonymization

    1. Front Matter
      Pages 119-119
    2. Vicenç Torra, Julián Salas
      Pages 121-137 Open Access
    3. Christian Burkert, Hannes Federrath
      Pages 138-155
  5. CBT Workshop: Lightning Networks and Level 2

    1. Front Matter
      Pages 175-175
    2. Marc Leinweber, Matthias Grundmann, Leonard Schönborn, Hannes Hartenstein
      Pages 177-194
    3. Georgia Avarikioti, Rolf Scheuner, Roger Wattenhofer
      Pages 195-210
    4. Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef
      Pages 211-218
    5. Jean-Yves Zie, Jean-Christophe Deneuville, Jérémy Briffaut, Benjamin Nguyen
      Pages 219-229
  6. CBT Workshop: Smart Contracts and Applications

    1. Front Matter
      Pages 231-231
    2. Massimo Bartoletti, Letterio Galletta, Maurizio Murgia
      Pages 233-243
    3. Alexander Chepurnoy, Amitabh Saxena
      Pages 244-254
    4. Michael Fröwis, Rainer Böhme
      Pages 255-270
    5. Arjun Choudhry, Ikechukwu Dimobi, Zachary M. Isaac Gould
      Pages 271-288
    6. Joran J. Honig, Maarten H. Everts, Marieke Huisman
      Pages 289-303
  7. CBT Workshop: Payment Systems, Privacy and Mining

    1. Front Matter
      Pages 305-305
    2. Georgia Avarikioti, Kenan Besic, Yuyi Wang, Roger Wattenhofer
      Pages 307-320
    3. Kazım Rıfat Özyılmaz, Nazmi Berhan Kongel, Ali Erhat Nalbant, Ahmet Özcan
      Pages 321-335
    4. Shahla Atapoor, Karim Baghery
      Pages 336-354
    5. George Bissias, David Thibodeau, Brian N. Levine
      Pages 372-390
    6. Aryaz Eghbali, Roger Wattenhofer
      Pages 391-398
  8. Back Matter
    Pages 399-400

About these proceedings

Introduction

This book constitutes the refereed conference proceedings of the 14th International Workshop on Data Privacy Management, DPM 2019, and the Third International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019, held in Luxembourg in September 2019.

For the CBT Workshop 10 full and 8 short papers were accepted out of 39 submissions. The selected papers are organized in the following topical headings: lightning networks and level 2; smart contracts and applications; and payment systems, privacy and mining. The DPM Workshop received 26 submissions from which 8 full and 2 short papers were selected for presentation. The papers focus on privacy preserving data analysis; field/lab studies; and privacy by design and data anonymization.

Chapter 2, “Integral Privacy Compliant Statistics Computation,” and Chapter 8, “Graph Perturbation as Noise Graph Addition: a New Perspective for Graph Anonymization,” of this book are available open access under a CC BY 4.0 license at link.springer.com.


Keywords

artificial intelligence authentication blockchain cryptocurrency systems cryptography data mining data privacy data security graph theory privacy privacy preserving software engineering source codes wireless telecommunication systems

Editors and affiliations

  1. 1.Universitat Oberta de CatalunyaBarcelonaSpain
  2. 2.Universitat Autonoma de BarcelonaBellaterraSpain
  3. 3.University of LuxembourgEsch-sur-AlzetteLuxembourg
  4. 4.Institut Mines-TélécomEvryFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-31500-9
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-31499-6
  • Online ISBN 978-3-030-31500-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site