Abstract is missing.
- SAML Privacy-Enhancing ProfileMoritz Horsch, Max Tuengerthal, Tobias Wich. 11-22 [doi]
- Eidas as guideline for the development of a pan European eid framework in futureidColette Cuijpers, Jessica Schroers. 23-38 [doi]
- Secure cloud computing with skidentity: A cloud-teamroom for the automotive industryMichael Kubach, Eray Özmü, Guntram Flach. 39-49 [doi]
- Making authentication stronger and more cost efficient with web of trustBob Hulsebosch, Maarten Wegdam, Martijn Oostdijk, Joost van Dijk, Remco Poortinga van Wijnen. 50-61 [doi]
- Towards a seamless digital Europe: the SSEDIC recommendations on digital identity managementMaurizio Talamo, Selvakumar Ramachandran, Maria-Laura Barchiesi, Daniela Merella, Christian H. Schunck. 62-72 [doi]
- Secure and trustworthy file sharing over cloud storage using eid tokensEduardo Duarte, Filipe Pinheiro, André Zúquete, Helder Gomes. 73-84 [doi]
- Towards a privacy-preserving inspection process for authentication solutions with conditional identificationFelix Bieker, Marit Hansen, Harald Zwingelberg. 85-96 [doi]
- Strengthening Web Authentication through TLS - Beyond TLS Client CertificatesAndreas Mayer, Vladislav Mladenov, Jörg Schwenk, Florian Feldmann, Christopher Meyer. 97-108 [doi]
- ENX ID - an architecture for practical and secure cross company authenticationMichael Kubach, Heiko Roßnagel, Lennart Oly, Immo Wehrenberg. 109-120 [doi]
- IT trends with impact on privacy and securityPetra Hoepner, Maximilian Schmidt, Christian Welzel. 121-126 [doi]
- Analyzing the state-of-the-art of scientific publications on identity management: is there an economic perspective?Nicolas Fähnrich, Michael Kubach. 127-132 [doi]
- A DNSSEC-based trust infrastructureBud P. Bruegger, Eray Özmü. 133-139 [doi]
- Using a whatsapp vulnerability for profiling individualsSebastian Kurowski. 140-146 [doi]
- Approach to vendor authenticationDetlef Houdeau, Amit Kumer Meher. 147-149 [doi]