Freiling and Sebastian Schinzel Authentication Breaking reCAPTCHA: A Holistic Approach via Shape Recognition, p.56 ,
Marc Fischlin, and Benjamin Milde From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?, p.68 ,
and Paul Dowland Network Security and Security Protocols A Case Study in Practical Security of Cable Networks, p.92 ,
Freiling, and Christian Schindelhauer Ceremony Analysis: Strengths and Weaknesses, p.104 ,
Brereton XII Table of Contents Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes, 116 Reto Koenig, Rolf Haenni, and Stephan Fischli Piracy Protection for Streaming Content in Home Networks . . . . . . . . . . . 128 ,
A Defense against JIT Spraying Attacks, p.142 ,
Ion Alberdi, and Thomas Plagemann Policy Compliance and Obligations Organizational Power and Information Security Rule Compliance, p.185 ,
235 Benjamin Kellermann Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users, p.247 ,
281 Nwokedi Idika and Bharat Bhargava Intrusion Detection Extending LSCs for, Behavioral Signature Modeling, p.293 ,
and Andy Schürr Detecting Illegal System Calls Using a Data-Oriented Detection ,
Eric Totel, and Frédéric Tronel Appendix IFIP Technical Committee 11: Security and Privacy Protection in Information Processing Systems, p.317 ,