H. Mohammed, M. J. Almeshekah, E. Atallah, and H. , Spafford Information Sharing and User Privacy in the Third-party Identity Management Landscape, p.174

M. Rezvani, M. Allahbakhsh, L. Vigentini, and .. , Aleksandar Ignjatovic, and Sanjay Jha A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control, p.204

B. Hive, W. Applications, and .. , A Zero Configuration Forms Honeypot for Productive, 267 Christoph Pohl

I. Analysis and .. Policies, 297 Fredrik Karlsson, Göran Goldkuhl, and Karin Hedström Understanding Collaborative Challenges in IT Security Preparedness Exercises, p.311

M. B. Line and .. , 325 Teodor Sommestad XIV Contents Attack Trees with Sequential Conjunction, p.339

R. Jhawar, B. Kordy, and S. Mauw, Sa?a Radomirovic´,Radomirovic´, and Rolando Trujillo-Rasua Enhancing the Security of Image CAPTCHAs Through Noise Addition, p.354

D. Lorenzi, E. Uzun, and .. , Jaideep Vaidya, Shamik Sural, and Vijayalakshmi Atluri Software Security SHRIFT System-Wide HybRid Information Flow Tracking, p.371

E. Lovat, A. Fromm, M. Mohr, A. Pretschner-isboxing-untrusted-libraries, and .. , An Instruction Substitution Based Data Sandboxing for x86, 386 Liang Deng, Qingkai Zeng, and Yao Liu Exploit Generation for Information Flow Leaks in Object-Oriented Programs, p.401

R. Quoc-huy-do and R. Bubel, Hähnle Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference, p.416

J. Ming, D. Xu, and D. , Wu Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach, 431 Zhijiao Zhang, Yashuai Lü, Yu Chen, Yongqiang Lü, and Yuanchun Shi Integrity for Approximate Joins on Untrusted Computational Servers . . . . . . 446

S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, and V. , Stefano Paraboschi, and Pierangela Samarati Applied Cryptography Fast Revocation of Attribute-Based Credentials for Both Users, p.463

W. Lueks, G. Alpár, and .. , Jaap-Henk Hoepman, and Pim Vullers Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment, p.479

T. Truong and M. , Anh-Duc Duong, and Isao Echizen A Secure Exam Protocol Without Trusted Parties, p.495

G. Bella, R. Giustolisi, G. Lenzini, P. Y. , and .. , Ryan Contents XV Mobile and Cloud Services Security ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis, p.513

L. Li, A. Bartel, T. F. Bissyandé, J. Klein, Y. Le-traon et al., Inácio An Empirical Study on Android for Saving Non-shared Data on Public Storage The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation, Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases Aspinall, and Maria Wolters A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585 Alevtina Dubovitskaya

S. Bacnet-'s-pitfalls and .. , Steffen Wendzel, and Michael Meier On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios 630 Nicolai Kuntze, Andreas Fuchs, and Carsten Rudolph Erratum to: On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios, 616 Jaspreet Kaur, Jernej Tonejc