Abstract is missing.
- Two-factor authentication: is the world ready?: quantifying 2FA adoptionThanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis. [doi]
- Collaborative filtering under a sybil attack: analysis of a privacy threatDavide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault. [doi]
- Exploring reverse engineering symptoms in Android appsHugo Gonzalez, Andi A. Kadir, Natalia Stakhanova, Abdullah J. Alzahrani, Ali A. Ghorbani. [doi]
- Deployment challenges in log-based PKI enhancementsStephanos Matsumoto, Pawel Szalachowski, Adrian Perrig. [doi]
- Mobile device fingerprinting considered harmful for risk-based authenticationJan Spooren, Davy Preuveneers, Wouter Joosen. [doi]
- Fox in the trap: thwarting masqueraders via automated decoy document deploymentJonathan Voris, Jill Jermyn, Nathaniel Boggs, Salvatore J. Stolfo. [doi]
- A study on data de-pseudonymization in the smart gridValentin Tudor, Magnus Almgren, Marina Papatriantafilou. [doi]