Abstract is missing.
- WYK: Mobile Device Authentication Using the User's Address BookMehari Msgna, Sokratis K. Katsikas, Vasileios Gkioulos. 1-16 [doi]
- Future-Proof Web Authentication: Bring Your Own FIDO2 ExtensionsFlorentin Putz, Steffen Schön, Matthias Hollick. 17-32 [doi]
- Heartbeat-Based Authentication on Smartwatches in Various Usage ContextsDmytro Progonov, Oleksandra Sokol. 33-49 [doi]
- Quantum Multi-factor AuthenticationHazel Murray, David Malone. 50-67 [doi]
- An Interface Between Legacy and Modern Mobile Devices for Digital IdentityVasilios Mavroudis, Chris Hicks, Jon Crowcroft. 68-76 [doi]
- Facial Recognition for Remote Electronic Voting - Missing Piece of the Puzzle or Yet Another Liability?Sven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel. 77-93 [doi]
- Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery PipelineAndrea Bisegna, Roberto Carbone, Silvio Ranise. 94-110 [doi]
- Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot InteractionShurook S. Almohamade, John A. Clark, James Law. 111-126 [doi]
- Private Data Harvesting on Alexa Using Third-Party SkillsJack Corbett, Erisa Karafili. 127-142 [doi]
- Handling Meta Attribute Information in Usage Control Policies (Short Paper)Theo Dimitrakos, Tezcan Dilshener, Alexander Kravtsov, Antonio La Marra, Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti. 143-151 [doi]
- "Ask App Not to Track": The Effect of Opt-In Tracking Authorization on Mobile PrivacyAnzo DeGiulio, Hanoom Lee, Eleanor Birrell. 152-167 [doi]