Abstract is missing.
- User Identification Using GamesOliver Buckley, Duncan Hodges. 3-14 [doi]
- Hermes: Hands-Free Authentication in Physical SpacesKulpreet Chilana, Federico Casalegno. 15-24 [doi]
- Implicit Authentication for Mobile Devices Using Typing BehaviorJonathan Gurary, Ye Zhu, Nahed Alnahash, Huirong Fu. 25-36 [doi]
- Fraud Protection for Online Banking - A User-Centered Approach on Detecting Typical Double-Dealings Due to Social Engineering and Inobservance Whilst Operating with Personal Login CredentialsVerena M. I. A. Hartl, Ulrike Schmuntzsch. 37-47 [doi]
- Vibration Based Tangible Tokens for Intuitive Pairing Among Smart DevicesDonghan Park, Hyunseung Choo. 48-56 [doi]
- Anonymous Authentication with a Bi-directional Identity Federation in the CloudFatema Rashid, Ali Miri. 57-64 [doi]
- An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010: 2011Paulo Realpe-Muñoz, César A. Collazos, Julio Hurtado, Toni Granollers, Jaime Velasco-Medina. 65-76 [doi]
- Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser AttacksTakashi Tsuchiya, Masahiro Fujita, Kenta Takahashi, Takehisa Kato, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki. 77-88 [doi]
- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia's Personal Health Information ActMaha Aljohani, Kirstie Hawkey, James Blustein. 91-102 [doi]
- Information Security Application Design: Understanding Your UsersRanjan Bhattarai, Ger Joyce, Saurabh Dutta. 103-113 [doi]
- Responsibility Modelling and Its Application Trust ManagementAndrew Blyth. 114-127 [doi]
- Security by Compliance? A Study of Insider Threat Implications for Nigerian BanksTesleem Fagade, Theo Tryfonas. 128-139 [doi]
- Current Trend of End-Users' Behaviors Towards Security MechanismsYasser M. Hausawi. 140-151 [doi]
- Share to Protect - Quantitative Study on Privacy Issues in V2X-TechnologyTeresa Schmidt, Ralf Philipsen, Martina Ziefle. 152-163 [doi]
- The Impact of Security Cues on User Perceived Security in e-CommerceSamuel N. Smith, Fiona Fui-Hoon Nah, Maggie X. Cheng. 164-173 [doi]
- Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden LeaksTheo Tryfonas, Michael Carter, Tom Crick, Panagiotis Andriotis. 174-185 [doi]
- Optional Data Disclosure and the Online Privacy Paradox: A UK PerspectiveMeredydd Williams, Jason R. C. Nurse. 186-197 [doi]
- Assessing the Feasibility of Adaptive Security Models for the Internet of ThingsWaqas Aman. 201-211 [doi]
- OpenStack Firewall as a Service Rule AnalyserDaniel Csubak, Attila Kiss. 212-220 [doi]
- Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive RecipesGeorge Kalpakis, Theodora Tsikrika, Christos Iliou, Thodoris Mironidis, Stefanos Vrochidis, Jonathan Middleton, Una Williamson, Ioannis Kompatsiaris. 221-233 [doi]
- Attack Tree Analysis for Insider Threats on the IoT Using IsabelleFlorian Kammüller, Jason R. C. Nurse, Christian W. Probst. 234-246 [doi]
- The State of Near-Field Communication (NFC) on the Android PlatformJaromir Karmazin, Pavel Ocenasek. 247-254 [doi]
- Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart HomeJason R. C. Nurse, Ahmad Atamli, Andrew Martin. 255-267 [doi]
- A Taxonomy to Classify Risk End-User Profile in Interaction with the Computing EnvironmentKarla Susiane Pereira, Eduardo Feitosa, Tayana Conte. 268-276 [doi]
- Security Middleware Programming Using P4Peter Vörös, Attila Kiss. 277-287 [doi]