Abstract is missing.
- Robust Resampling Detection in Digital ImagesHieu Cuong Nguyen, Stefan Katzenbeisser. 3-15 [doi]
- Feature Selection on Handwriting Biometrics: Security Aspects of Artificial ForgeriesKarl Kümmel, Tobias Scheidat, Claus Vielhauer, Jana Dittmann. 16-25 [doi]
- Security Analysis of Image-Based PUFs for Anti-counterfeitingSaloomeh Shariati, François Koeune, François-Xavier Standaert. 26-38 [doi]
- Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical InferenceMouhamadou L. Diong, Patrick Bas, Chloé Pelle, Wadih Sawaya. 39-54 [doi]
- Data-Minimizing Authentication Goes MobilePatrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer. 55-71 [doi]
- No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial EncryptionZhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu. 72-86 [doi]
- Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL ScansAndrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann. 89-98 [doi]
- A Method for Reducing the Risk of Errors in Digital Forensic InvestigationsGraeme Horsman, Christopher Laing, Paul Vickers. 99-106 [doi]
- Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication PerformanceTobias Scheidat, Karl Kümmel, Claus Vielhauer. 107-116 [doi]
- A New Approach to Commutative Watermarking-EncryptionRoland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang. 117-130 [doi]
- Systematic Engineering of Control Protocols for Covert ChannelsSteffen Wendzel, Jörg Keller. 131-144 [doi]
- Efficiency of Secure Network Coding SchemesElke Franz, Stefan Pfennig, André Fischer. 145-159 [doi]
- A New Approach for Private Searches on Public-Key Encrypted DataAmar Siad. 160-173 [doi]
- Multi-level Authentication Based Single Sign-On for IMS ServicesMohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul, Abdellah Ait Ouahman. 174-187 [doi]
- Are 128 Bits Long Keys Possible in Watermarking?Patrick Bas, Teddy Furon. 191 [doi]
- Predicate-Tree Based Pretty Good Privacy of DataWilliam Perrizo, Arjun G. Roy. 192-194 [doi]
- OOXML File Analysis of the July 22nd Terrorist ManualHanno Langweg. 195-197 [doi]
- Privacy-Preserving Scheduling Mechanism for eHealth SystemsMilica Milutinovic, Vincent Naessens, Bart De Decker. 198-200 [doi]
- Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized CoprocessorsJürgen Fuß, Wolfgang Kastl, Robert Kolmhofer, Georg Schönberger, Florian Wex. 201-203 [doi]
- A Framework for Enforcing User-Based Authorization Policies on Packet Filter FirewallsAndré Zúquete, Pedro Correia, Miguel Rocha. 204-206 [doi]
- From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) SensorRobert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer. 207-210 [doi]
- Practical Revocable Anonymous CredentialsJan Hajny, Lukas Malina. 211-213 [doi]
- Privacy Management in Global OrganisationsSiani Pearson. 217-237 [doi]
- From Panopticon to Fresnel, Dispelling a False Sense of SecurityJon Crowcroft, Ian Brown. 238-242 [doi]