Abstract is missing.
- Logics to Reason Formally About Trust Computation and ManipulationAlessandro Aldini, Mirko Tagliaferri. 1-15 [doi]
- An Authorization Framework for Cooperative Intelligent Transport SystemsSowmya Ravidas, Priyanka Karkhanis, Yanja Dajsuren, Nicola Zannone. 16-34 [doi]
- A Framework for the Validation of Access Control SystemsSaid Daoudagh, Francesca Lonetti, Eda Marchetti. 35-51 [doi]
- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC)Dominic Heutelbeck. 52-68 [doi]
- NoCry: No More Secure Encryption Keys for Cryptographic RansomwareZiya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan. 69-85 [doi]
- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric AuthenticationHaruna Higo, Toshiyuki Isshiki, Masahiro Nara, Satoshi Obana, Toshihiko Okamura, Hiroto Tamiya. 86-103 [doi]
- Reflexive Memory Authenticator: A Proposal for Effortless Renewable BiometricsNikola K. Blanchard, Siargey Kachanovich, Ted Selker, Florentin Waligorski. 104-121 [doi]
- Collaborative Authentication Using Threshold CryptographyAysajan Abidin, Abdelrahaman Aly, Mustafa A. Mustafa. 122-137 [doi]
- MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication ProtocolsFederico Sinigaglia, Roberto Carbone, Gabriele Costa, Silvio Ranise. 138-155 [doi]
- A Risk-Driven Model to Minimize the Effects of Human Factors on Smart DevicesSandeep Gupta, Attaullah Buriro, Bruno Crispo. 156-170 [doi]
- A Formal Security Analysis of the p=uiv p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted EmailItzel Vázquez Sandoval, Gabriele Lenzini. 171-187 [doi]