(BQ) In this part, the following contents will be discussed: Expecting the unexpected: Towards robust credential infrastructure; Optical DNA; Passwords: If we’re so smart, why are we still using them? Defeating cross-site request forgery attacks with browser-enforced authenticity protection; Evil searching: Compromise and recompromise of internet hosts for phishing; Detecting denial of service attacks in tor; Cryptographic combinatorial securities exchanges; Cryptographic combinatorial clock-proxy auctions; Secure multiparty computation goes live; Coercion resistant end-to-end voting; Relations among privacy notions. |