Spafford Information Sharing and User Privacy in the Third-party Identity Management Landscape, p.174 ,
Aleksandar Ignjatovic, and Sanjay Jha A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control, p.204 ,
A Zero Configuration Forms Honeypot for Productive, 267 Christoph Pohl ,
297 Fredrik Karlsson, Göran Goldkuhl, and Karin Hedström Understanding Collaborative Challenges in IT Security Preparedness Exercises, p.311 ,
325 Teodor Sommestad XIV Contents Attack Trees with Sequential Conjunction, p.339 ,
Sa?a Radomirovic´,Radomirovic´, and Rolando Trujillo-Rasua Enhancing the Security of Image CAPTCHAs Through Noise Addition, p.354 ,
Jaideep Vaidya, Shamik Sural, and Vijayalakshmi Atluri Software Security SHRIFT System-Wide HybRid Information Flow Tracking, p.371 ,
An Instruction Substitution Based Data Sandboxing for x86, 386 Liang Deng, Qingkai Zeng, and Yao Liu Exploit Generation for Information Flow Leaks in Object-Oriented Programs, p.401 ,
Hähnle Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference, p.416 ,
Wu Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach, 431 Zhijiao Zhang, Yashuai Lü, Yu Chen, Yongqiang Lü, and Yuanchun Shi Integrity for Approximate Joins on Untrusted Computational Servers . . . . . . 446 ,
Stefano Paraboschi, and Pierangela Samarati Applied Cryptography Fast Revocation of Attribute-Based Credentials for Both Users, p.463 ,
Jaap-Henk Hoepman, and Pim Vullers Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment, p.479 ,
Anh-Duc Duong, and Isao Echizen A Secure Exam Protocol Without Trusted Parties, p.495 ,
Ryan Contents XV Mobile and Cloud Services Security ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis, p.513 ,
Inácio An Empirical Study on Android for Saving Non-shared Data on Public Storage The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation, Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases Aspinall, and Maria Wolters A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585 Alevtina Dubovitskaya ,
Steffen Wendzel, and Michael Meier On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios 630 Nicolai Kuntze, Andreas Fuchs, and Carsten Rudolph Erratum to: On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios, 616 Jaspreet Kaur, Jernej Tonejc ,