Abstract is missing.
- Improving Identity and Authentication Assurance in Research & Education FederationsJule Anna Ziegler, Michael Schmidt, Mikael Linden. 1-18 [doi]
- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare OrganizationsUmberto Morelli, Silvio Ranise, Damiano Sartori, Giada Sciarretta, Alessandro Tomasi. 19-35 [doi]
- Is a Smarter Grid Also Riskier?Karin Bernsmed, Martin Gilje Jaatun, Christian Frøystad. 36-52 [doi]
- BioID: A Privacy-Friendly Identity DocumentFatih Balli, F. Betül Durak, Serge Vaudenay. 53-70 [doi]
- On the Statistical Detection of Adversarial Instances over Encrypted DataMina Sheikhalishahi, Majid Nateghizad, Fabio Martinelli, Zekeriya Erkin, Marco Loog. 71-88 [doi]
- Understanding Attestation: Analyzing Protocols that Use QuotesJoshua D. Guttman, John D. Ramsdell. 89-106 [doi]
- Challenges of Using Trusted Computing for Collaborative Data ProcessingPaul Georg Wagner, Pascal Birnstill, Jürgen Beyerer. 107-123 [doi]
- Secure Trust Evaluation Using Multipath and Referral Chain MethodsMohammad G. Raeini, Mehrdad Nojoumian. 124-139 [doi]
- Personal Cross-Platform ReputationJohannes Blömer, Nils Löken. 140-157 [doi]
- An OBDD-Based Technique for the Efficient Synthesis of Garbled CircuitsStelvio Cimato, Valentina Ciriani, Ernesto Damiani, Maryam Ehsanpour. 158-167 [doi]