Abstract is missing.
- On the Development of Advanced Parental Control ToolsWalter Fuertes, Karina Quimbiulco, Fernando Galarraga, José Luis García-Dorado. 1-6 [doi]
- A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder SurfersHyunsoo Kim, Hyoungshick Kim, Ji Won Yoon. 7-12 [doi]
- Addressing Security Challenges in Cloud Computing - A Pattern-Based ApproachPriya Anand, Jungwoo Ryoo, Hyoungshick Kim. 13-18 [doi]
- A Fuzzy-Logic Approach for Evaluating a Cloud Service ProviderJohn Mitchell, Syed Rizvi, Jungwoo Ryoo. 19-24 [doi]
- Performing Clickjacking Attacks in the Wild: 99% are Still Vulnerable!Daehyun Kim, Hyoungshick Kim. 25-29 [doi]
- Touch to Authenticate - Continuous Biometric Authentication on Mobile DevicesMarlies Temper, Simon Tjoa, Manfred Kaiser. 30-35 [doi]