Abstract is missing.
- Toward Secure and Trustworthy Identity Management Systems: A Knowledge-Base Driven ApproachGianluca Sassetti, Amir Sharif, Roberto Carbone, Silvio Ranise. 3-22 [doi]
- Always Authenticated, Never Exposed: Continuous Authentication via Zero-Knowledge ProofsDennis Hamm, Erwin Kupris, Thomas Schreck. 23-42 [doi]
- Pragmatic Guidelines for Formal Modeling of Security CeremoniesBarbara Fila, Ermenda Hoxha. 43-62 [doi]
- Access Control Administration for Smart HomesClara Bertolissi, Maribel Fernández. 63-80 [doi]
- Parameter-Efficient Fine-Tuning of LLMs for Intrusion Detection and Firewall Rule Generation: A Comparative StudyChi Zhang, Muhammad Shadi Hajar, Harsha Kalutarage, Lankeshwara Munasinghe. 83-98 [doi]
- ABusing Social Media and Sentiment Analysis for Stock Market PredictionCrawford Brown, Nikolaos Pitropakis, Christos Chrysoulas, Costas Lambrinoudakis. 99-117 [doi]
- DrATC+: A Divide et Impera Extension to Trust-Based Dynamic RoutingDavide Ferraris, Letizia Russo, Lorenzo Monti. 118-135 [doi]
- How to Train Your Guardian - Evaluating Cyber Security Exercises Using Situation AwarenessHåvard Jakobsen Ofte, Sokratis K. Katsikas. 139-158 [doi]
- Towards an Architecture for Managing Security Under the EU Cyber Resilience ActDaniele Canavese, Afonso Ferreira, Romain Laborde, Mohamed Ali Kandi. 159-172 [doi]
- Google Tag Manager and Its Privacy IssuesJaviera Alegría, Ivana Bachmann, Javier Bustos-Jiménez. 173-189 [doi]
- Measuring Modern Phishing Tactics: A Quantitative Study of Body Obfuscation Prevalence, Co-occurrence, and Filter ImpactAntony Dalmiere, Zheng Zhou, Guillaume Auriol, Vincent Nicomette, Pascal Marchand. 193-209 [doi]
- Nicknames for Group SignaturesGuillaume Quispe, Pierre Jouvelot, Gérard Memmi. 210-230 [doi]
- The Impact of Filtering in Differential Cryptanalysis: A Case Study on FEAL-8Ivan Costa, Ivone Amorim, Eva Maia, Isabel Praça. 231-249 [doi]