C. Felix, Freiling and Sebastian Schinzel Authentication Breaking reCAPTCHA: A Holistic Approach via Shape Recognition, p.56

P. Baecher, N. Büscher, and .. , Marc Fischlin, and Benjamin Milde From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?, p.68

M. Jali, S. Furnell, and .. , and Paul Dowland Network Security and Security Protocols A Case Study in Practical Security of Cable Networks, p.92

. Amir-alsbih and C. Felix, Freiling, and Christian Schindelhauer Ceremony Analysis: Strengths and Weaknesses, p.104

K. Radke, C. Boyd, J. G. Nieto, and M. , Brereton XII Table of Contents Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes, 116 Reto Koenig, Rolf Haenni, and Stephan Fischli Piracy Protection for Streaming Content in Home Networks . . . . . . . . . . . 128

H. Jin, J. Lotspiech-software-security-jitdefender, and .. , A Defense against JIT Spraying Attacks, p.142

S. Mondet, Ion Alberdi, and Thomas Plagemann Policy Compliance and Obligations Organizational Power and Information Security Rule Compliance, p.185

H. Kikuchi, D. Kagawa, A. Basu, K. Ishii, and .. , 235 Benjamin Kellermann Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users, p.247

A. Kolmogorov, C. Approach-for-measuring-attack-path-complexity, and .. , 281 Nwokedi Idika and Bharat Bhargava Intrusion Detection Extending LSCs for, Behavioral Signature Modeling, p.293

S. Patzina and L. Patzina, and Andy Schürr Detecting Illegal System Calls Using a Data-Oriented Detection

J. Demay, F. Majorczyk, and .. , Eric Totel, and Frédéric Tronel Appendix IFIP Technical Committee 11: Security and Privacy Protection in Information Processing Systems, p.317