Abstract is missing.
- An Ontology-Based Approach for Setting Security Policies in Smart HomesAlberto Monge Roffarello, Luigi De Russis. 1-14 [doi]
- ClapAuth: A Gesture-Based User-Friendly Authentication Scheme to Access a Secure InfrastructureAttaullah Buriro, Francesco Ricci 0001. 15-30 [doi]
- User Authentication on Headset-Like Devices by Bioacoustic SignalsDmytro Progonov, Heorhii Naumenko, Oleksandra Sokol, Viacheslav Derkach. 31-47 [doi]
- The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon FramesPhilipp Jakubeit, Andreas Peter, Maarten van Steen. 48-69 [doi]
- Protecting FIDO Extensions Against Man-in-the-Middle AttacksAndre Büttner, Nils Gruschka. 70-87 [doi]
- Authentication, Authorization, and Selective Disclosure for IoT Data Sharing Using Verifiable Credentials and Zero-Knowledge ProofsNikos Fotiou, Iakovos Pittaras, Spiros Chadoulos, Vasilios A. Siris, George C. Polyzos, Nikolaos Ipiotis, Stratos Keranidis. 88-101 [doi]
- Privacy-Preserving Speaker Verification and Speech RecognitionWisam Abbasi. 102-119 [doi]
- An E-Voting System Based on Tornado CashStefano Bistarelli, Bruno Lazo La Torre Montalvo, Ivan Mercanti, Francesco Santini 0001. 120-135 [doi]
- Linking Contexts from Distinct Data Sources in Zero Trust FederationMasato Hirai, Daisuke Kotani, Yasuo Okabe. 136-144 [doi]