Applied Cryptography.- An Aggregate Signature with Pre-Communication in the Plain Public Key Model.- The Adversary Capabilities In Practical Byzantine Fault Tolerance.- Privacy.- Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.- Efficient permutation protocol for MPC in the head.- Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF 78.- Formal Methods for Security and Trust.- Secure Implementation of a Quantum-Future GAKE Protocol.- Deciding a Fragment of (alpha, beta)-Privacy.- Systems Security.- TLS beyond the broker: Enforcing ne-grained security and trust in publish/subscribe environments for IoT.- Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.- Towards Decentralized and Provably Secure Cross-Domain Solutions.