Invited Papers.- Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks.- Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation.- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey.- A Graph Database-based Approach to Analyze Network Log Files.- Full Papers.- A Privacy-Enhancing Framework for Internet of Things Services.- Using Audio Characteristics for Mobile Device Authentication.- Ethereum Analysis via Node Clustering.- Strong Known Related-Key Attacks and the Security of ECDSA.- Threat Assessment of Enterprise Applications via Graphical Modelling.- A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing.- Towards Secure Open Banking Architecture: An Evaluation with OWASP.- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms.- OVERSCAN: OAuth 2.0 Scanner for Missing Parameters.- LaT-Voting: Traceable Anonymous E-Voting on Blockchain.- Distributed Secure Storage System Based on Blockchain and TPA.- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique.- A Practical Dynamic Enhanced BFT protocol.- Pre-adjustment Based Anti-collusion Mechanism for Audio Signals.- Detecting Intruders by User File Access Patterns.- Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture.- Privacy Preserving Machine Learning with Limited Information Leakage.- Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained.- Sequential Aggregate MACs with Detecting Functionality Revisited.- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System.- EEG-based Authentication with Variational Universal Background Model.- An Efficient Vulnerability Detection Model for Ethereum Smart Contracts.- A Comparative Study on Network Traffic Clustering.- Tell Them From Me: an Encrypted Application Profiler.- Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP.- Gnocchi: Multiplexed Payment Channels for Cryptocurrencies.- Difficulty of decentralized structure due to rational user behavior on Blockchain.- A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration.- Cryptanalysis of Raindrop and FBC.- Attribute Based Encryption with Publicly Verifiable Outsourced Decryption.- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost.- Lattice based verifiably encrypted double authentication preventing Signatures.- Privacy-Preserving Sequential Data Publishing.- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter.- Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks.- SparkDA: RDD-Based High Performance Data Anonymization Technique for Spark Platform.- Short Papers.- An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol.- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices.- Privacy-preserving k-means clustering: an application to driving style Recognition.- Derandomized PACE with Mutual Authentication.- A Muti-attributes-based Trust Model of Internet of Vehicle.- Using Sparse Composite Document Vectors to Classify VBA Macros.- A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications.