Abstract is missing.
- Authentication and Authorization for Interoperable IoT ArchitecturesNikos Fotiou, George C. Polyzos. 3-16 [doi]
- Bringing Access Control Tree to Big DataFrancesco Di Cerbo, Marco Rosa. 17-29 [doi]
- SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication SchemeAttaullah Buriro, Bruno Crispo, Mojtaba Eskandari, Sandeep Gupta, Athar Mahboob, Rutger Van Acker. 30-37 [doi]
- A Protocol to Strengthen Password-Based AuthenticationItzel Vázquez Sandoval, Borce Stojkovski, Gabriele Lenzini. 38-46 [doi]
- Managing Private Credentials by Privacy-Preserving BiometricsBian Yang, Guoqiang Li 0007. 47-55 [doi]
- Policy Support for Autonomous Swarms of DronesAlan Cullen, Erisa Karafili, Alan Pilgrim, Christopher Williams, Emil Lupu. 56-70 [doi]
- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected AccountsErisa Karafili, Daniele Sgandurra, Emil Lupu. 73-87 [doi]
- Towards a Framework for Testing the Security of IoT Devices ConsistentlyGurjan Lally, Daniele Sgandurra. 88-102 [doi]
- Misuse Detection in a Simulated IaaS EnvironmentBurhan Al-Bayati, Nathan L. Clarke, Paul Dowland, Fudong Li. 103-115 [doi]
- Dissuading Stolen Password ReuseSlim Trabelsi, Chedy Missaoui. 116-128 [doi]