Abstract is missing.
- Password policy simulation and analysisRichard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino. 1-10 [doi]
- Certificate-less user authentication with consentShingo Orihara, Yukio Tsuruoka, Kenji Takahashi. 11-16 [doi]
- Delayed password disclosureMarkus Jakobsson, Steven Myers. 17-26 [doi]
- On identity assurance in the presence of federated identity management systemsYolanta Beres, Adrian Baldwin, Marco Casassa Mont, Simon Shiu. 27-35 [doi]
- Linkability estimation between subjects and message contents using formal conceptsStefan Berthold, Sebastian Clauß. 36-45 [doi]
- Implementing identity provider on mobile phoneTsuyoshi Abe, Hiroki Itoh, Kenji Takahashi. 46-52 [doi]
- Modeling cryptographic properties of voice and voice-based entity authenticationGiovanni Di Crescenzo, Munir Cochinwala, Hyong Sop Shim. 53-61 [doi]
- Identity federation for voip-based servicesSamir Saklikar, Subir Saha. 62-71 [doi]
- Using reputation to augment explicit authorizationPhillip J. Windley, Devlin Daley, Bryant Cutler, Kevin Tew. 72-81 [doi]
- Receipt management- transaction history based trust establishmentAbhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bertino. 82-91 [doi]