Abstract is missing.
- Deep Learning Based Sequential Mining for User Authentication in Web ApplicationsMatan Levi, Itay Hazan. 1-15 [doi]
- An Interoperable Architecture for Usable Password-Less AuthenticationMatthew Casey, Mark Manulis, Christopher J. P. Newton, Robin Savage, Helen Treharne. 16-32 [doi]
- auth.js: Advanced Authentication for the WebNeophytos Christou, Elias Athanasopoulos. 33-49 [doi]
- Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native ApplicationsAmir Sharif, Roberto Carbone, Giada Sciarretta, Silvio Ranise. 50-70 [doi]
- Micro-Id-Gym: A Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the LaboratoryAndrea Bisegna, Roberto Carbone, Giulio Pellizzari, Silvio Ranise. 71-89 [doi]
- IFTTT Privacy CheckerFederica Paci, Davide Bianchin, Elisa Quintarelli, Nicola Zannone. 90-107 [doi]
- A Comparison Among Policy Editors for Attributed Based Access Control ModelFabio Martinelli, Christina Michailidou, Oleksii Osliak, Alessandro Rosetti, Antonio La Marra, Theo Dimitrakos. 108-123 [doi]
- Automatic Firewalls' Configuration Using Argumentation ReasoningErisa Karafili, Fulvio Valenza. 124-140 [doi]
- On Results of Data Aggregation OperationsFrancesco Di Cerbo, Marco Rosa, Rocío Cabrera Lozoya. 141-153 [doi]
- The Cost of Having Been Pwned: A Security Service Provider's PerspectiveGergely Biczók, Máté Horváth, Szilveszter Szebeni, István Lám, Levente Buttyán. 154-167 [doi]