Data Privacy Management, Cryptocurrencies and Blockchain Technology

ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings

  • Joaquin Garcia-Alfaro
  • Jordi Herrera-Joancomartí
  • Giovanni Livraga
  • Ruben Rios
Conference proceedings DPM 2018, CBT 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11025)

Also part of the Security and Cryptology book sub series (LNSC, volume 11025)

Table of contents

  1. Front Matter
    Pages I-XV
  2. CBT Workshop: Smart Contracts

    1. Front Matter
      Pages 1-1
    2. Hisham S. Galal, Amr M. Youssef
      Pages 3-19
    3. Macià Mut-Puigserver, M. Magdalena Payeras-Capellà, Miquel A. Cabot-Nadal
      Pages 20-37
    4. Rick Klomp, Andrea Bracciali
      Pages 38-56
    5. Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov
      Pages 57-64
  3. CBT Workshop: Second Layer, Off-chain Transactions and Transparency

    1. Front Matter
      Pages 65-65
    2. Dmytro Piatkivskyi, Mariusz Nowostawski
      Pages 67-75
    3. Georgia Avarikioti, Gerrit Janssen, Yuyi Wang, Roger Wattenhofer
      Pages 76-84
    4. Mustafa Al-Bassam, Sarah Meiklejohn
      Pages 94-110
  4. CBT Workshop: Consensus, Mining Pools and Performance

    1. Front Matter
      Pages 111-111
    2. Tommy Koens, Erik Poll
      Pages 113-129
    3. Colin Boyd, Christopher Carr
      Pages 130-139
    4. Mohiuddin Ahmed, Jinpeng Wei, Yongge Wang, Ehab Al-Shaer
      Pages 140-154
    5. George Bissias, Brian N. Levine, David Thibodeau
      Pages 155-172
  5. CBT Workshop: Deadlocks, Attacks and Privacy

    1. Front Matter
      Pages 173-173
    2. Shira Werman, Aviv Zohar
      Pages 175-187
    3. Felix Engelmann, Frank Kargl, Christoph Bösch
      Pages 188-196
    4. Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
      Pages 197-206
  6. DPM Workshop: Privacy Assessment and Trust

    1. Front Matter
      Pages 207-207
    2. Isabel Wagner, Eerke Boiten
      Pages 225-241
    3. Constantin Cătălin Drăgan, Mark Manulis
      Pages 242-259
  7. DPM Workshop: Private Data and Searches

    1. Front Matter
      Pages 261-261
    2. Martin Franke, Ziad Sehili, Marcel Gladbach, Erhard Rahm
      Pages 263-278
    3. Bruno C. Leal, Israel C. Vidal, Felipe T. Brito, Juvêncio S. Nobre, Javam C. Machado
      Pages 279-295
    4. Avradip Mandal, John C. Mitchell, Hart Montgomery, Arnab Roy
      Pages 296-310
  8. DPM Workshop: Internet of Things

    1. Front Matter
      Pages 311-311
    2. Tom Lodge, Andy Crabtree, Anthony Brown
      Pages 313-328
    3. Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou
      Pages 345-353
  9. DPM Workshop: Privacy and Cryptography

    1. Front Matter
      Pages 355-355
    2. Stefan Wüller, Malte Breuer, Ulrike Meyer, Susanne Wetzel
      Pages 373-388
  10. DPM Workshop: Future Internet

    1. Front Matter
      Pages 405-405
    2. Julián Salas, Vicenç Torra
      Pages 407-414 Open Access
    3. Naoto Yanai, Jason Paul Cruz
      Pages 415-421
    4. David Pàmies-Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castellà-Roca, Joaquin Garcia-Alfaro
      Pages 431-440
  11. Back Matter
    Pages 441-442

About these proceedings


This book constitutes the refereed conference proceedings of the 2nd International Workshop on Cryprocurrencies and Blockchain Technology, CBT 2018, and the 13thInternational Workshop on Data Privacy Management, DPM 2018, on conjunction with the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. From the CBT Workshop 7 full and 8 short papers out of 39 submissions are included. The selected papers cover aspects of identity management, smart contracts, soft- and hardforks, proof-of-works and proof of stake as well as on network layer aspects and the application of blockchain technology for secure connect event ticketing. The DPM Workshop received 36 submissions from which 11 full and 5 short papers were selected for presentation. The papers focus on challenging problems such as translation of high-level buiness goals into system level privacy policies, administration of sensitive identifiers, data integration and privacy engineering.


artificial intelligence authentication cryptography data mining data privacy data security Human-Computer Interaction (HCI) internet Internet of Things (IoT) privacy privacy preserving problem solving public key cryptography social networks software engineering software evaluation ubiquitous computing user interfaces wireless telecommunication systems world wide web

Editors and affiliations

  1. 1.Télécom SudParisEvryFrance
  2. 2.Enginyeria de la Informacio I de les ComUniversitat Autonoma de BarcelonaBellaterraSpain
  3. 3.Università degli Studi di MilanoCremaItaly
  4. 4.Universidad de MálagaMálagaSpain

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment