Abstract is missing.
- Biometrische Template-Protection-Verfahren und InteroperabilitätsstrategienChristoph Busch, Sebastian Abt, Claudia Nickel, Ulrike Korte, Xuebing Zhou. 1-12
- Biometrische Nachrichten-AuthentisierungChristoph Busch, Daniel Hartung. 13-24
- Diffusion of Federated Identity ManagementDetlef Hühnlein, Heiko Roßnagel, Jan Zibuschka. 25-36
- Quantitative Model-Based Safety Analysis: A Case StudyMatthias Güdemann, Frank Ortmeier. 37-48
- Real-Time Fault-Tolerant Routing in High-Availability Multicast-Aware Video NetworksRoman Messmer, Jörg Keller. 49-60
- State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated ServicesTobias Distler, Rüdiger Kapitza, Hans P. Reiser. 61-72
- A Parallel Computing System with Specialized Coprocessors for Cryptanalytic AlgorithmsWolfgang Kastl, Thomas Loimayr. 73-84 [doi]
- Towards Secure and Reliable Firewall Systems based on MINIX3Rüdiger Weis, Brian Schüler, Stefan A. Flemming. 85-92
- A Transparent Bridge for Forensic Sound Network Traffic Data AcquisitionStefan Kiltz, Mario Hildebrandt, Robert Altschaffel, Jana Dittmann. 93-104
- A Study on Features for the Detection of Copy-Move ForgeriesVincent Christlein, Christian Riess, Elli Angelopoulou. 105-116
- Lineare Zeilen- und Spaltenprädiktoren zur Erkennung von BildskalierungenMatthias Kirchner. 117-128
- Collusion-Secure Fingerprint Watermarking for Real World ApplicationsMarcel Schäfer, Waldemar Berchtold, Martin Steinebach, Sascha Zmudzinski, Margareta Heilmann, Stefan Katzenbeisser. 129-140
- Iterative präzisionsbewertende SignaturgenerierungRené Rietz, Sebastian Schmerl, Michael Vogel, Hartmut König. 141-152
- Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren DatenspeicherungTobias Hoppe, Sönke Holthusen, Sven Tuchscheerer, Stefan Kiltz, Jana Dittmann. 153-164
- Towards Secure Deletion on SmartphonesMichael Spreitzenbarth, Thorsten Holz. 165-176
- Amun: Automatic Capturing of Malicious SoftwareJan Göbel. 177-190
- Towards Optimal Sensor Placement Strategies for Early Warning SystemsJan Göbel, Philipp Trinius. 191-204
- A Malware Instruction Set for Behavior-Based AnalysisPhilipp Trinius, Carsten Willems, Thorsten Holz, Konrad Rieck. 205-216
- State-of-the-Art Kryptoverfahren für drahtlose Sensornetze - Eine Krypto-Bibliothek für MantisOSBjörn Stelte, Björn Saxe. 217-228 [doi]
- On Security Protocols for Desktop SharingUlrich Kühn. 229-240
- Extended Lattice Reduction Experiments Using the BKZ AlgorithmMichael Schneider 0002, Johannes Buchmann. 241-252
- Bedrohungsmodellierung (Threat Modeling) in der SoftwareentwicklungFabian Schwab, Alexander Findeisen, Peter Sakal, Hartmut Pohl. 253-264
- Why Showing One TLS Certificate is not Enough - Towards a Browser Feedback for Multiple TLS Certificate VerificationsHenrich Christopher Pöhls. 265-276
- WatchCop - Safer Software Execution through Hardware/Software Co-DesignChristian Ristig, René Fritzsche, Christian Siemers. 277-288
- A Fuzzy Model for IT Security InvestmentsGuido Schryen. 289-304
- Quantifying the Attack Surface of a Web ApplicationThomas Heumann, Sven Türpe, Jörg Keller. 305-316
- Social Lending aus der Perspektive des DatenschutzesRainer Böhme, Stefanie Pötzsch. 317-328
- Security Analysis of OpenIDPavol Sovis, Florian Kohlar, Jörg Schwenk. 329-340
- Session Fixation - The Forgotten Vulnerability?Michael Schrank, Bastian Braun, Martin Johns, Joachim Posegga. 341-352
- CAPTCHAs: The Good, the Bad, and the UglyPaul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Lützow, Dominique Schröder. 353-365