Abstract is missing.
- SPROOF: A Decentralized Platform for Attribute-Based AuthenticationClemens Brunner, Fabian Knirsch, Dominik Engel. 1-23 [doi]
- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open IssuesRoberto Di Pietro, Maurantonio Caprolu, Simone Raponi. 24-47 [doi]
- Information Technology Consulting Firms' Readiness for Managing Information Security IncidentsChristine Große, Maja Nyman, Leif Sundberg. 48-73 [doi]
- Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-DeviceKazuhide Fukushima, Damien Marion 0001, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley. 74-92 [doi]
- Black-Box Attacks via the Speech Interface Using Linguistically Crafted InputMary K. Bispham, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith. 93-120 [doi]
- Proposal and Performance Evaluation of an Order-Specified Aggregate Authority-Transfer SignatureTakuya Ezure, Masaki Inamura. 121-136 [doi]
- Context-Aware Software-Defined Networking for Automated Incident Response in Industrial NetworksFlorian Patzer, Philipp Lüdtke, Ankush Meshram, Jürgen Beyerer. 137-161 [doi]
- Transparency Enhancing Tools and the GDPR: Do They Match?Dayana Spagnuelo, Ana Ferreira, Gabriele Lenzini. 162-185 [doi]
- User Study of the Effectiveness of a Privacy Policy Summarization ToolVanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto. 186-206 [doi]
- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of ApplicationSaid Daoudagh, Francesca Lonetti, Eda Marchetti. 207-229 [doi]
- Protection of User-Defined Sensitive Attributes on Online Social Networks Against Attribute Inference Attack via Adversarial Data MiningKhondker Jahid Reza, Md Zahidul Islam 0001, Vladimir Estivill-Castro. 230-249 [doi]
- User Behavioral Biometrics and Machine Learning Towards Improving User Authentication in SmartphonesJosé Torres, Sergio de los Santos, Efthimios Alepis, Constantinos Patsakis. 250-271 [doi]
- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of ConceptWenjun Xiong, Fredrik Krantz, Robert Lagerström. 272-287 [doi]
- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence MechanismsMary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith. 288-316 [doi]
- Hypervisor Memory Introspection and Hypervisor Based Malware HoneypotNezer Jacob Zaidenberg, Michael Kiperberg, Raz Ben Yehuda, Roee Leon, Asaf Algawi, Amit Resh. 317-334 [doi]
- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEsChristophe Ponsard, Jeremy Grandclaudon. 335-357 [doi]
- Analysing the Provenance of IoT DataChiara Bodei, Letterio Galletta. 358-381 [doi]
- Improving Interoperability in Multi-domain Enterprise Right Management ApplicationsLuigi Catuogno, Clemente Galdi. 382-402 [doi]
- Fine-Grained Access Control for Querying Over Encrypted Document-Oriented DatabaseMaryam Almarwani, Boris Konev, Alexei Lisitsa. 403-425 [doi]