Abstract is missing.
- Fine-Grained Privacy Control for Fitness and Health Applications Using the Privacy Management PlatformChristoph Stach. 1-25 [doi]
- Touch and Move: Incoming Call User AuthenticationAleksandr Eremin, Konstantin Kogos, Yana Valatskayte. 26-39 [doi]
- Elicitation of Privacy Requirements for the Internet of Things Using ACCESSORSChristoph Stach, Bernhard Mitschang. 40-65 [doi]
- A Simple Attack on CaptchaStarThomas Gougeon, Patrick Lacharme. 66-85 [doi]
- Notify This: Exploiting Android Notifications for Fun and ProfitEfthimios Alepis. 86-108 [doi]
- The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture ModellingSascha Alpers, Roman Pilipchuk, Andreas Oberweis, Ralf H. Reussner. 109-124 [doi]
- A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption AttackZiya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vázquez Sandoval. 125-151 [doi]
- GenVote: Blockchain-Based Customizable and Secure Voting PlatformPraneeth Babu Marella, Matea Milojkovic, Jordan Mohler, Gaby G. Dagher. 152-171 [doi]
- A Detailed Analysis of the CICIDS2017 Data SetIman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani. 172-188 [doi]
- Personalising Security Education: Factors Influencing Individual Awareness and ComplianceIsmini Vasileiou, Steven Furnell. 189-200 [doi]
- Managing Cybersecurity Break-ins Using Bluetooth Low Energy Devices to Verify Attackers: A Practical StudyKenneth C. K. Wong, Aaron Hunter. 201-214 [doi]
- On Building a Visualisation Tool for Access Control PoliciesCharles Morisset, David Sanchez. 215-239 [doi]
- Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEsChristophe Ponsard, Jeremy Grandclaudon. 240-260 [doi]
- Privacy Preserving Collaborative Agglomerative Hierarchical Clustering ConstructionMina Sheikhalishahi, Mona Hamidi, Fabio Martinelli. 261-280 [doi]
- Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering DataGünther Eibl, Sebastian Burkhart, Dominik Engel. 281-302 [doi]