Evaluating the privacy properties of secure VoIP metadata João S. Resende, Patrícia R. Sousa, Luís Antunes
On the Hardness of Separation of Duties Problems for Cloud Databases Ferdinand Bollwein, Lena Wiese
PERSUADED: Fighting Social Engineering Attacks with a Serious Game Dina Aladawy, Kristian Beckers, Sebastian Pape
Phishing Detection: Developing and Evaluating a Five Minutes Security Awareness Video Melanie Volkamer, Karen Renaud, Benjamin Maximilian Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber
Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes Frank Pallas, Martin Grambow
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment Majed Alshammari, Andrew Simpson
Towards Blockchain-based Identity and Access Management for Internet of Things in Enterprises Martin Nuss, Alexander Puchta, Michael Kunz
Towards the Definition of a Security Incident Response Modelling Language Myrsini Athinaiou, Haralambos Mouratidis, Michalis Pavlidis , Theo Fotis, Emmanouil Panaousis
Trustworthiness Cases – Toward Preparation for the Trustworthiness Certification Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel