Abstract is missing.
- Collective Exposure: Peer Effects in Voluntary Disclosure of Personal DataRainer Böhme, Stefanie Pötzsch. 1-15 [doi]
- It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security AdviceNicolas Christin, Serge Egelman, Timothy Vidas, Jens Grossklags. 16-30 [doi]
- Evaluating the Privacy Risk of Location-Based ServicesJulien Freudiger, Reza Shokri, Jean-Pierre Hubaux. 31-46 [doi]
- Selections: Internet Voting with Over-the-Shoulder Coercion-ResistanceJeremy Clark, Urs Hengartner. 47-61 [doi]
- Malice versus AN.ON: Possible Risks of Missing Replay and Integrity ProtectionBenedikt Westermann, Dogan Kesdogan. 62-76 [doi]
- Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration ToolsJay Novak, Jonathan Stribley, Kenneth Meagher, J. Alex Halderman. 77-84 [doi]
- A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)Ben Palmer, Kris Bubendorfer, Ian Welch. 85-92 [doi]
- Impeding Individual User Profiling in Shopper Loyalty ProgramsPhilip Marquardt, David Dagon, Patrick Traynor. 93-101 [doi]
- Beyond Risk-Based Access Control: Towards Incentive-Based Access ControlDebin Liu, Ninghui Li, Xiaofeng Wang, L. Jean Camp. 102-112 [doi]
- Authenticated Key Exchange under Bad RandomnessGuomin Yang, Shanshan Duan, Duncan S. Wong, Chik-How Tan, Huaxiong Wang. 113-126 [doi]
- Oblivious Outsourced Storage with DelegationMartin Franz, Peter Williams, Bogdan Carbunar, Stefan Katzenbeisser, Andreas Peter, Radu Sion, Miroslava Sotáková. 127-140 [doi]
- Homomorphic Signatures for Digital PhotographsRob Johnson, Leif Walsh, Michael Lamb. 141-157 [doi]
- Revisiting the Computational Practicality of Private Information RetrievalFemi G. Olumofin, Ian Goldberg. 158-172 [doi]
- Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)Mohammed Ashraful Tuhin, Reihaneh Safavi-Naini. 173-181 [doi]
- A New Approach towards Coercion-Resistant Remote E-Voting in Linear TimeOliver Spycher, Reto E. Koenig, Rolf Haenni, Michael Schläpfer. 182-189 [doi]
- An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFsUlrich Rührmair, Christian Jaeger, Michael Algasinger. 190-204 [doi]
- Peeling Away Layers of an RFID Security SystemHenryk Plötz, Karsten Nohl. 205-219 [doi]
- Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMVRoss J. Anderson, Mike Bond, Omar Choudary, Steven J. Murdoch, Frank Stajano. 220-234 [doi]
- hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted ComputersShujun Li, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz, Junaid Jameel Ahmad. 235-249 [doi]
- Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)Christopher Soghoian, Sid Stamm. 250-259 [doi]
- Proximax: Measurement-Driven Proxy Dissemination (Short Paper)Damon McCoy, Jose Andre Morales, Kirill Levchenko. 260-267 [doi]
- BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper)Peter Lofgren, Nicholas Hopper. 268-275 [doi]
- Towards Secure Bioinformatics Services (Short Paper)Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder. 276-283 [doi]
- Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web ApplicationsTheodoor Scholte, Davide Balzarotti, Engin Kirda. 284-298 [doi]
- Re-evaluating the Wisdom of Crowds in Assessing Web SecurityPern Hui Chia, Svein Johan Knapskog. 299-314 [doi]
- Mercury: Recovering Forgotten Passwords Using Personal DevicesMohammad Mannan, David Barrera, Carson D. Brown, David Lie, Paul C. van Oorschot. 315-330 [doi]