Abstract is missing.
- Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data ProtectionAnn Cavoukian. 1-16 [doi]
- iSAM: An iPhone Stealth Airborne MalwareDimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis. 17-28 [doi]
- TCP Ack Storm DoS AttacksRaz Abramov, Amir Herzberg. 29-40 [doi]
- Detecting Hidden Storage Side Channel Vulnerabilities in Networked ApplicationsFelix C. Freiling, Sebastian Schinzel. 41-55 [doi]
- Breaking reCAPTCHA: A Holistic Approach via Shape RecognitionPaul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde. 56-67 [doi]
- From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino, Alessandro Sorniotti. 68-79 [doi]
- Quantifying the Effect of Graphical Password Guidelines for Better SecurityMohd Zalisham Jali, Steven Furnell, Paul Dowland. 80-91 [doi]
- A Case Study in Practical Security of Cable NetworksAmir Alsbih, Felix C. Freiling, Christian Schindelhauer. 92-103 [doi]
- Ceremony Analysis: Strengths and WeaknessesKenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton. 104-115 [doi]
- Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting SchemesReto E. Koenig, Rolf Haenni, Stephan Fischli. 116-127 [doi]
- Piracy Protection for Streaming Content in Home NetworksHongxia Jin, Jeffrey B. Lotspiech. 128-141 [doi]
- JITDefender: A Defense against JIT Spraying AttacksPing Chen, Yi Fang, Bing Mao, Li Xie. 142-153 [doi]
- Retrofitting Security in COTS Software with Binary RewritingPádraig O'Sullivan, Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis. 154-172 [doi]
- Generating Optimised and Formally Checked Packet Parsing CodeSebastien Mondet, Ion Alberdi, Thomas Plagemann. 173-184 [doi]
- Organizational Power and Information Security Rule ComplianceElla Kolkowska, Gurpreet Dhillon. 185-196 [doi]
- Delegation of Obligations and ResponsibilityMeriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Daniel Le Métayer, Guillaume Piolle. 197-209 [doi]
- Distributed Security Policy ConformanceMirko Montanari, Ellick Chan, Kevin Larson, Wucherl Yoo, Roy H. Campbell. 210-222 [doi]
- Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned DatasetsHiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo. 223-234 [doi]
- Privacy-Enhanced Web-Based Event Scheduling with Majority AgreementBenjamin Kellermann. 235-246 [doi]
- Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP UsersGe Zhang. 247-258 [doi]
- Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing DomainStefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh. 259-270 [doi]
- On Computing Enterprise IT Risk MetricsSandeep Bhatt, William G. Horne, Prasad Rao. 271-280 [doi]
- A Kolmogorov Complexity Approach for Measuring Attack Path ComplexityNwokedi C. Idika, Bharat K. Bhargava. 281-292 [doi]
- Extending LSCs for Behavioral Signature ModelingSven Patzina, Lars Patzina, Andy Schürr. 293-304 [doi]
- Detecting Illegal System Calls Using a Data-Oriented Detection ModelJonathan-Christofer Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel. 305-316 [doi]
- IFIP Technical Committee 11 Security and Privacy Protection in Information Processing SystemsKai Rannenberg, S. H. (Basie) von Solms, Leon Strous. 317-325 [doi]