Abstract is missing.
- Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacksLothar Fritsch, Marie Mecaliff, Kathinka Wik Opdal, Mathias Rundgreen, Toril Sachse. 15-26 [doi]
- A novel approach to establish trust in verifiable credential issuers in Self-sovereign identity ecosystems using TRAINIsaac Henderson Johnson Jeyakumar, David W. Chadwick, Michael Kubach. 27-38 [doi]
- Continuous authorization over HTTP using Verifiable Credentials and OAuth 2.0Nikos Fotiou, Evgenia Faltaka, Vasilis Kalos, Anna S. Kefala, Iakovos Pittaras, Vasilios A. Siris, George C. Polyzos. 39-50 [doi]
- Integration of Self-Sovereign Identity into Conventional Software using Established IAM Protocols: A SurveyMichael Kuperberg, Robin Klemens. 51-62 [doi]
- eIDAS 2.0: Challenges, perspectives and proposals to avoid contradictions between eIDAS 2.0 and SSISteffen Schwalm, Daria Albrecht, Ignacio Alamillo. 63-74 [doi]
- Corporate Digital Responsibility and the current Corporate Social Responsibility standard: An analysis of applicabilityKim Valerie Carl, Timothy M. C. Zilcher, Oliver Hinz. 75-86 [doi]
- Flexible Method for Supporting OAuth 2.0 Based Security Profiles in KeycloakTakashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi. 87-98 [doi]
- Risk variance: Towards a definition of varying outcomes of IT security risk assessmentSebastian Kurowski, Christian H. Schunck. 99-110 [doi]
- A user-centric approach to IT-security risk analysis for an identity management solutionNicolas Fähnrich, Matthias Winterstetter, Michael Kubach. 113-118 [doi]
- Adversary Tactics and Techniques specific to Cryptocurrency ScamsAndrea Horch, Christian H. Schunck, Christopher Ruff. 119-124 [doi]
- Preservation of (higher) Trustworthiness in IAM for distributed workflows and systems based on eIDASHermann Strack, Sebastian Karius, Marlies Gollnick, Meiko Lips, Sandro Wefel, Robert Altschaffel. 125-130 [doi]
- Online tool for matching company demands with IT-security offeringsNicolas Fähnrich, Heiko Roßnagel. 131-136 [doi]
- Combination of x509 and DID/VC for inheritance properties of trust in digital identitiesPaul Bastian, Carsten Stöcker, Steffen Schwalm. 137-142 [doi]