Abstract is missing.
- IMC: A Classification of Identity Management ApproachesDaniela Pöhn, Wolfgang Hommel. 3-20 [doi]
- Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in BankingMhairi Aitken, Magdalene Ng, Ehsan Toreini, Aad van Moorsel, Kovila P. L. Coopamootoo, Karen Elliott. 21-38 [doi]
- Creative Toolkits for TIPSHelen Collard, Jo Briggs. 39-55 [doi]
- Post-quantum Certificates for Electronic Travel DocumentsGaëtan Pradel, Chris J. Mitchell. 56-73 [doi]
- Development of Trust Infrastructures for Virtual Asset Service ProvidersThomas Hardjono. 74-91 [doi]
- Risk Assessment of Sharing Cyber Threat IntelligenceAdham Albakri, Eerke A. Boiten, Richard Smith. 92-113 [doi]
- kUBI: A Framework for Privacy and Transparency in Sensor-Based Business Models for Consumers: A Pay-How-You-Drive ExampleChristian Roth, Mario Saur, Dogan Kesdogan. 114-132 [doi]
- Verifiable Contracting - A Use Case for Onboarding and Contract Offering in Financial Services with eIDAS and Verifiable CredentialsSérgio Manuel Nóbrega Gonçalves, Alessandro Tomasi, Andrea Bisegna, Giulio Pellizzari, Silvio Ranise. 133-144 [doi]
- ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM)Antonio Muñoz, Aristeidis Farao, Jordy Ryan Casas Correia, Christos Xenakis. 147-165 [doi]
- Making Picnic Feasible for Embedded DevicesJohannes Winkler, Andreas Wallner, Christian Steger. 166-180 [doi]
- Sandboxing the Cyberspace for Cybersecurity Education and LearningStylianos Karagiannis, Emmanouil Magkos, Christoforos Ntantogian, Luís L. Ribeiro. 181-196 [doi]
- CloudVaults: Integrating Trust Extensions into System Integrity Verification for Cloud-Based EnvironmentsBenjamin Larsen, Heini Bergsson Debes, Thanassis Giannetsos. 197-220 [doi]
- Twizzle - A Multi-purpose Benchmarking Framework for Semantic Comparisons of Multimedia Object PairsStephan Escher, Patrick Teufert, Robin Herrmann, Thorsten Strufe. 223-230 [doi]
- You've Got Nothing on Me! Privacy Friendly Face Recognition ReloadedStephan Escher, Patrick Teufert, Lukas Hain, Thorsten Strufe. 231-242 [doi]
- OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking FrameworkHui Wang, Anthony T. S. Ho, Shujun Li. 243-260 [doi]
- Nothing Standard About It: An Analysis of Minimum Security Standards in OrganizationsJake Weidman, Igor Bilogrevic, Jens Grossklags. 263-282 [doi]
- The Bigger Picture: Approaches to Inter-organizational Data Protection Impact AssessmentDimitri Van Landuyt, Laurens Sion, Pierre Dewitte, Wouter Joosen. 283-293 [doi]
- Systematic Scenario Creation for Serious Security-Awareness GamesVera Hazilov, Sebastian Pape 0001. 294-311 [doi]
- Analysing Simulated Phishing Campaigns for StaffMelanie Volkamer, Martina Angela Sasse, Franziska Boehm. 312-328 [doi]