Abstract is missing.
- Mobile devices as secure eid reader using trusted execution environmentsMaximilian Stein. 11-19 [doi]
- Using Trusted Execution Environments in Two-factor Authentication: comparing approachesRoland van Rijswijk-Deij, Erik Poll. 20-31 [doi]
- Unlinkability support in a decentralised, multiple-identity social networkSimon Thiel, Fabian Hermann, Marcel Heupel, Mohamed Bourimi. 32-42 [doi]
- Secure Hardware-Based Public Cloud StorageBernd Zwattendorfer, Bojan Suzic, Peter Teufl, Andreas Derler. 43-54 [doi]
- An extensible client platform for eid, signatures and moreTobias Wich, Moritz Horsch, Dirk Petrautzki, Johannes Schmölz, Detlef Hühnlein, Thomas Wieland, Simon Potzernheim. 55-68 [doi]
- Service providers' requirements for eid solutions: empirical evidence from the leisure sectorMichael Kubach, Heiko Roßnagel, Rachelle Sellung. 69-81 [doi]
- An open ecard plug-in for accessing the German national personal health recordRaik Kuhlisch, Dirk Petrautzki, Johannes Schmölz, Ben Kraufmann, Florian Thiemer, Tobias Wich, Detlef Hühnlein, Thomas Wieland. 82-93 [doi]
- Selective LDAP Multi-Master ReplicationThomas Bauereiss, Stefan Gohmann, Dieter Hutter, Alexander Kläser. 94-105 [doi]
- Approaches and challenges for a single sign-on enabled extranet using jasig CASFlorian Holzschuher, René Peinl. 106-117 [doi]
- Identity management in cloud computing in conformity with European union law? - problems and approaches pursuant to the proposal for a regulation by the European commission on electronic identification and trust services for electronic transactions in the internal marketStephan Sädtler. 118-129 [doi]
- How to authenticate mobile devices in a web environment - the SIM-ID approachFlorian Feldmann, Jörg Schwenk. 130-141 [doi]
- Authentication on mobile devices for business applicationMartina Müller, Fabian Zoller, Ingo Pansa, Ansgar Gerlicher. 142-154 [doi]
- Common Criteria certified open source software - fact or fiction?Tomas Gustavsson. 155 [doi]
- The eid-terminology work of futureidBud P. Bruegger, Moritz Christian Müller. 156-162 [doi]
- Landscape eID in Europe in CY2013Detlef Houdeau. 163 [doi]
- Not built on sand - how modern authentication complements federationRolf Lindemann. 164-168 [doi]
- An open source eID simulatorHolger Funke, Tobias Senger. 169 [doi]
- Authentication on high critical infrastructures using interoperable federated identitiesArmin Lunkeit, Jürgen Großmann. 170-177 [doi]
- Password Management through PWMMenno Pieters. 178 [doi]
- Authentication and security integration for ecampus services at the university of applied sciences harz using the German electronic identity card/eid and egovernment standardsHermann Strack. 179-181 [doi]
- Cloud-based provisioning of qualified certificates for the German ID cardMarcel Selhorst, Carsten Schwarz. 182 [doi]
- Upcoming specifications from the openid foundationHenrik Biering, Axel Nennker. 183-186 [doi]
- A novel set of measures against insider attacks - sealed cloudHubert A. Jäger, Arnold Monitzer, Ralf Rieken, Edmund Ernst. 187-197 [doi]