Accepted papers

OSDM: An Organizational Supervised Delegation Model for RBAC
Nezar Nassr, Nidal Aboudagga and Eric Steegmans.

No Integrity, thanks -- Verifiable Explicit Consented Undecidability of Integrity
Henrich C. Pöhls.

Learning Fine-Grained Structured Input for Memory Corruption Detection
Lei Zhao and Debin Gao.

Domain-Specific Pseudonymous Signatures for the German Identity Card
Jens Bender, Özgür Dagdelen, Marc Fischlin and Dennis Kügler.

Design and implementation of a GPU-accelerated OpenSSL engine
Johannes Gilger, Johannes Barnickel and Ulrike Meyer.

Efficient Two-Move Blind Signatures in the Common Reference String Model
Essam Ghadafi and Nigel P. Smart.

On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree
Noboru Kunihiro.

Secure Hierarchical Identity-Based Identification without Random Oracles
Atsushi Fujioka, Taiichi Saito and Keita Xagawa.

Selective Document Retrieval from Encrypted Database
Christoph Boesch, Qiang Tang, Pieter Hartel and Willem Jonker.

Risk is Conflicting Incentives
Lisa Rajbhandari and Einar Snekkenes.

A Highly-Ecient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching
Ciprian Pungila and Viorel Negru.

Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems
Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes and Hitesh Tewari.

Revisiting Difficulty Notions For Client Puzzles and DoS Resilience
Bogdan Groza and Bogdan Warinschi.

Solutions for the storage Problem of McEliece public and private Keys on Memory-constrained Platforms
Falko Strenzke.

On the self-similarity nature of the revocation data
Carlos Gañán, Jorge Mata-Diaz, José L. Muñoz, Oscar Esparza and Juanjo Alins.

Strong Authentication with Mobile Phone
Sanna Suoranta, André Andrade and Tuomas Aura.

Security and Privacy for WLAN Roaming over Hops with per-connection Tariff Negotiation
Johannes Barnickel and Ulrike Meyer.

An Empirical Study of Dangerous Behaviors in Firefox Extensions
Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang and Zhiyong Feng.

Differential Attacks on Reduced RIPEMD-160
Florian Mendel, Tomislav Nad, Stefan Scherz and Martin Schläffer.

Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited
Andreas Peter, Max Kronberg, Wilke Trei and Stefan Katzenbeisser.

Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems
Jinwei Hu, Khaled Khan, Yun Bai and Yan Zhang.

Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?
Chaitrali Amrutkar, Patrick Traynor and Paul C. van Oorschot.

A Quantitative Approach for Inexact Enforcement of Security Policies
Peter Drabik, Fabio Martinelli and Charles Morisset.

100% Connectivity for Location Aware Code Based KPD in WSN: Merging Blocks
Samiran Bag, Aritra Dhar and Pinaki Sarkar.

Dynamic Anomaly Detection for More Trustworthy Outsourced Computation in Hybrid Clouds
Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden and Stefan Katzenbeisser.