M. Loong and Y. , Adnan Al Anbuky, and William Liu New Algorithmic Approaches to Point Constellation Recognition, p.80

A. Kolberger, I. Schaumüller-bichl, V. Brunner, and .. , and Martin Deutschmann Mobile Security Text-Based Active Authentication for Mobile Devices, p.99

S. Smartphones and .. , Design and Evaluation of a New Privacy Risk Communication Method for, p.113

B. Braun, J. Koestler, J. Posegga, and M. , Johns Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph, 142 Xin Sun, p.156

Z. Tzermias, V. Prevelakis, and .. , and Sotiris Ioannidis Security and Privacy in Video Surveillance: Requirements and Challenges, p.169

G. Qin, C. Patsakis, M. .. Bouroche-towards-a-framework-for-benchmarking-privacy-abc-technologies, and .. Web-surfing, 197 Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, and Neeraj Suri Metrics and Risk Assessment Evaluating the Security of a DNS Query Obfuscation Scheme for Private, 205 Dominik Herrmann, Max Maaß, and Hannes Federrath A Novel Metric for the Evaluation of IDSs Effectiveness . . . . . . . . . . . . . . . 220

G. Varona, C. , and S. , Fenz Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks, p.242

S. Ismail, E. Sitnikova, J. , and M. Applications, Slay Information Flow Control Compatibility of Safety Properties and Possibilistic Information Flow Security in, 250 Thomas Bauereiss and Dieter Hutter Table of Contents XIII Ghostrail: Ad Hoc Control-Flow Integrity for Web, p.264

B. Braun, C. Gries-javascript, and .. , Benedikt Petschkuhn, and Joachim Posegga An Information Flow Monitor-Inlining Compiler for Securing a Core of, p.278

. Géant-trustbroker, Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures, p.307

D. Pöhn, S. Metzger, and .. , and Wolfgang Hommel Efficient Identity-Based Signature from Lattices, p.321

H. Yair, . Diaz-tellez, L. Eliane, and .. Bodanese, Theo Dimitrakos, and Michael Turner Identifiability and Decision Making Authorship Attribution for Forensic Investigation with Thousands of Authors, p.339

M. Yang, K. Chow, and E. , 351 Christoph Bier and Jonas Prior A Preliminary Study on User's Decision Making towards Retweet Messages, 359 Nor Athiyah Abdullah, Dai Nishioka, Yuko Tanaka, and Yuko Murayama Malicious Behavior and Fraud Behavior Analysis of Web Service Attacks, p.366

M. Carminati, R. Caron, F. Maggi, P. Dss-incompatibilities, and .. , 395 S ¸erif Bahtiyar, Gürkan Gür, and Levent Altay Organizational Security PriMan: Facilitating the Development of Secure and Privacy-Preserving, 403 Andreas Put, Italo Dacosta, Milica Milutinovic, and Bart De Decker Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values, p.417

L. Connolly, M. Lang, and .. , and Doug Tygar Organizational Transformation and Information Security Culture: A Telecom Case Study, p.431

N. Ahmed-safa, R. Safavi-naini, and F. Siamak, Shahandashti Trusted Computing to Increase Security and Privacy in eID Authentication, p.485