Abstract is missing.
- Universally composable adaptive oblivious transfer (with access control) from standard assumptionsMasayuki Abe, Jan Camenisch, Maria Dubovitskaya, Ryo Nishimaki. 1-12 [doi]
- A secure channel for attribute-based credentials: [short paper]Gergely Alpár, Jaap-Henk Hoepman. 13-18 [doi]
- UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptographyMaarten Everts, Jaap-Henk Hoepman, Johanneke Siljee. 19-24 [doi]
- A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionalityLujo Bauer, Cristian Bravo-Lillo, Elli Fragkaki, William Melicher. 25-36 [doi]
- Taboos and desires of the UK public for identity management in the future: findings from two survey gamesLiesbet van Zoonen, Georgina Turner. 37-44 [doi]
- Probing identity management: preliminary findingsLilia Gomez Flores, Sandra Wilson, Dougie Kinnear. 45-50 [doi]
- Geo-location based QR-Code authentication scheme to defeat active real-time phishing attackSeung-Hyun Kim, Daeseon Choi, Seung Hun Jin, Sung-Hoon Lee. 51-62 [doi]
- Towards standardizing trusted evidence of identityBian Yang, Christoph Busch, Julien Bringer, Els Kindt, Willem Ronald Belser, Uwe Seidel, Edward Springmann, Uwe Rabeler, Andreas Wolf, Magnar Aukrust. 63-72 [doi]
- Reachability analysis for role-based administration of attributesXin Jin, Ram Krishnan, Ravi S. Sandhu. 73-84 [doi]
- Options for integrating eID and SAMLDetlef Hühnlein, Jörg Schwenk, Tobias Wich, Vladislav Mladenov, Florian Feldmann, Andreas Mayer, Johannes Schmölz, Bud P. Bruegger, Moritz Horsch. 85-96 [doi]
- Federated identity to access e-government services: are citizens ready for this?Sacha Brostoff, Charlene Jennett, Miguel Malheiros, Martina Angela Sasse. 97-108 [doi]