D. Q. Nguyen, L. Weng, and B. , Preneel Network Security On Detecting Abrupt Changes in Network Entropy Time Series, Philipp Winter

M. Maachaoui and W. , Anas Abou El Kalam, and Christian Fraboul Part III: Posters High Capacity FFT-Based Audio, p.235

J. Fruth, R. Merkel, and J. , Dittmann Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme, p.244

M. Asim, L. Ibraimi, and M. , Petkovi´cPetkovi´c Anonymous Authentication from Public-Key Encryption Revisited (Extended Abstract) 247 Daniel Slamanig Part IV: Keynotes Mobile Identity Management, 253 Jaap-Henk Hoepman

E. Ronald, Leenes From Protecting a System to Protecting a Global Ecosystem, p.255