Abstract is missing.
- Towards Robust Trust Frameworks for Data Exchange: A Multidisciplinary InquiryAytaj Badirova, Bithin Alangot, Theo Dimitrakos, Ramin Yahyapour. 15-26 [doi]
- Economically Viable Identity Ecosystems: Value Capture and Market StrategiesMichael Kubach, Heiko Roßnagel. 27-38 [doi]
- Evaluating the Good Practices of User Experience for Mobile and Electronic Governmental ServicesRachelle Sellung, Lennart Kiss. 39-50 [doi]
- Accountable Banking TransactionsSebastian Mödersheim, Siyu Chen. 51-60 [doi]
- Gaining Back the Control Over Identity Attributes: Access Management Systems Based on Self-Sovereign IdentityKenneth-Raphael Keil, Ricardo Bochnia, Ivan Gudymenko, Stefan Köpsell, Jürgen Anke. 61-72 [doi]
- Evaluating the evaluation criteria for account-recovery procedures in passwordless authenticationManuel Keil, Alf Zugenmaier. 73-84 [doi]
- GRAIN: Truly Privacy-friendly and Self-sovereign Trust Establishment with GNS and TRAINMartin Schanzenbach, Sebastian Nadler, Isaac Henderson Johnson Jeyakumar. 85-92 [doi]
- Towards Building GDPR-Friendly Consent Management Systems on Top of Self-Sovereign Identity EcosystemsJulia Schramm, Tobias Eichinger. 93-102 [doi]
- A Trust Registries Enrollment Tool Supporting Decentralized Ecosystem Governance: Use Case HealthcareIsaac Henderson Johnson Jeyakumar, Michael Kubach, Juan Vargas, John Walker. 103-114 [doi]
- Learnings from a Guided Method for Experience Design: Psychological Needs in the Context of the Privacy ValueAnne Elisabeth Krüger, Stefan Brandenburg. 115-126 [doi]
- Hyperledger Indy Besu as a permissioned ledger in Selfsovereign IdentityAlexander Shcherbakov. 127-137 [doi]
- Strengthen Digital Sovereignty of Smartphone Users: Evaluation Results of a Tailored Analysis Tool for App BehaviorSusen Döbelt, Dominik Lange. 139-150 [doi]
- Qualified Electronic Signatures with the EU Digital Identity WalletTobias Wich, Detlef Hühnlein, Florian Otto, Mike Prechtl. 151-162 [doi]
- Secure Industrial Device WalletAnkita Kumari, Anita Aghaie, Anne Passarelli, Niranjana Papagudi Subrahmanyam, Aliza Maftun. 165-170 [doi]
- MINERVA: Secure Collaborative Machine Tool Data Utilization Leveraging Confidentiality-Protecting TechnologiesAndy Ludwig, Michael P. Heinl, Alexander Giehl. 171-176 [doi]
- Fulfilling Principles of Self-Sovereign Identity: Towards a Conformity Assessment Approach for Human WalletsDustin Doege, Ricardo Bochnia, Jürgen Anke. 177-182 [doi]
- Determining the Efficiency of Mitigations Based on Covered ThreatsMatthias Winterstetter. 183-188 [doi]
- Trustworthy QWACs -Fact or Fiction?Kai Martius, Tina Hühnlein, Detlef Hühnlein, Tobias Wich. 189-194 [doi]
- Qualified Ledgers - Breakthrough for proven security and legal trust in DLT through eIDAS2 Regulation?Ignacio Alamillo, Steffen Schwalm, Carsten Stöcker, Ricky Thiermann. 195-200 [doi]