Abstract is missing.
- Identity management tools for protecting online privacyJan Camenisch. 1-2 [doi]
- GISL: a generalized identity specification language based on XML schemaYuan Cao, Lin Yang. 3-12 [doi]
- A comprehensive framework enabling data-minimizing authenticationPatrik Bichsel, Jan Camenisch, Franz-Stefan Preiss. 13-22 [doi]
- Digital identity security architecture in EthosW. Michael Petullo, Jon A. Solworth. 23-30 [doi]
- Who needs Facebook or Google+ anyway: privacy and sociality in social network sitesRonald Leenes. 31-32 [doi]
- Johnny in internet café: user study and exploration of password autocomplete in web browsersKemal Bicakci, Nart Bedin Atalay, Hakan Ezgi Kiziloz. 33-42 [doi]
- Leveraging social networks to gain access to organisational resourcesDavid W. Chadwick, George Inman, Kristy W. S. Siu, Mohammad Sadek Ferdous. 43-52 [doi]
- Anonymous credentials from (indexed) aggregate signaturesSébastien Canard, Roch Lescuyer. 53-62 [doi]
- The power of recognition: secure single sign-on using TLS channel bindingsJörg Schwenk, Florian Kohlar, Marcus Amon. 63-72 [doi]
- Behavioral biometrics for persistent single sign-onTarik Mustafic, Arik Messerman, Seyit Ahmet Çamtepe, Aubrey-Derrick Schmidt, Sahin Albayrak. 73-82 [doi]
- Client-based authentication technology: user-centric authentication using secure containersConor P. Cahill, Jason Martin, Matthew W. Pagano, Vinay Phegade, Anand Rajan. 83-92 [doi]