Security Properties and Attacks.- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties.- Reducing the Forensic Footprint with Android Accessibility Attacks.- A Novel Machine Learning Methodology for Detecting |Phishing Attacks in Real Time.- Confidentiality Schema.- Revocable access to encrypted message boards.- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0.- Security Processes.- Improved Feature Engineering for Free-Text Keystroke Dynamics.- Subversion-Resistant Commitment Schemes: Definitions and Constructions.- Challenges in IT Security Processes and Solution Approaches with Process Mining.