| 2008 | A Composite Network Security Assessment. Suleyman Kondakci |
| 2008 | A Device Management Framework for Secure Ubiquitous Service Delivery. Adrian Leung, Chris J. Mitchell |
| 2008 | A Formal Comparison of the Bell & LaPadula and RBAC Models. Lionel Habib, Mathieu Jaume, Charles Morisset |
| 2008 | A Friend Mechanism for Mobile Ad Hoc Networks. Shukor Abd Razak, Normalia Samian, Mohd Aizaini Maarof |
| 2008 | A Group Key Agreement Scheme Revisited. Zhengjun Cao, Lihua Liu |
| 2008 | A Model for the Study of Privacy Issues in Secure Shell Connections. Maurizio Dusi, Francesco Gringoli, Luca Salgarelli |
| 2008 | A New Narrow Block Mode of Operations for Disk Encryption. Mohamed Abo El-Fotouh, Klaus Diepold |
| 2008 | A New Secure Binding Management Protocol for Mobile IPv6 Networks. Osama A. Elshakankiry, Andy Carpenter, Ning Zhang |
| 2008 | A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. Hannan Xiao, Bruce Christianson, Ying Zhang |
| 2008 | A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer Networks. Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou |
| 2008 | A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech. Liaqat Ali Khan, Muhammad Shamim Baig |
| 2008 | A Time and Storage Efficient Solution to Remote File Integrity Check. A. V. Sarad, Sankar Kuppan, M. Vipin |
| 2008 | ACML: Capability Based Attack Modeling Language. Navneet Kumar Pandey, S. K. Gupta, Shaveta Leekha, Jingmin Zhou |
| 2008 | Abusing SIP Authentication. Humberto J. Abdelnur, Tigran Avanesov, Michaël Rusinowitch, Radu State |
| 2008 | Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment. Tobias Hoppe, Stefan Kiltz, Jana Dittmann |
| 2008 | An Automated Validation Method for Security Policies: The Firewall Case. Ryma Abassi, Sihem Guemara El Fatmi |
| 2008 | An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. Feng Chen, Lingyu Wang, Jinshu Su |
| 2008 | An Implementation Infrastructure for Server-Passive Timed-Release Cryptography. Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, George Stephanides |
| 2008 | Automatic Verification of Simulatability in Security Protocols. Tadashi Araragi, Olivier Pereira |
| 2008 | COTraSE: Connection Oriented Traceback in Switched Ethernet. Marios S. Andreou, Aad P. A. van Moorsel |
| 2008 | Challenges for Security Typed Web Scripting Languages Design. Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan |
| 2008 | Chaotic Quantum Cryptography. Stamatios V. Kartalopoulos |
| 2008 | Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations. Ali Nasrat Haidar, Ali E. Abdallah |
| 2008 | Data Fusion Assurance for the Kalman Filter in Uncertain Networks. Bonnie Zhu, Shankar Sastry |
| 2008 | Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement Multitoning. Hao Luo, Fa-Xin Yu, Jeng-Shyang Pan |
| 2008 | Designing a DRM System. Franco Frattolillo, Federica Landolfi |
| 2008 | Developing a Security Typed Java Servlet. Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan |
| 2008 | Dynamic Substitution Model. Mohamed Abo El-Fotouh, Klaus Diepold |
| 2008 | Efficient Hierarchical Group-Oriented Key Establishment and Decryption. Sigurd Eskeland, Vladimir A. Oleshchuk |
| 2008 | Ensemble of One-Class Classifiers for Network Intrusion Detection System. Anazida Binti Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin, Ajith Abraham |
| 2008 | Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation. N. R. Sunitha, B. B. Amberker |
| 2008 | Geolocation-Based Trust for Vanet's Privacy. Jetzabel M. Serna, Jesus Luna, Manel Medina |
| 2008 | IRC Traffic Analysis for Botnet Detection. Claudio Mazzariello |
| 2008 | Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions. Mothanna Alkubeily, Hatem Bettahar, Abdelmadjid Bouabdallah |
| 2008 | Improving the Efficiency of Misuse Detection by Means of the q-gram Distance. Slobodan Petrovic, Sverre Bakke |
| 2008 | Information Assurance in Critical Infrastructures via Wireless Sensor Networks. Michele Albano, Stefano Chessa, Roberto Di Pietro |
| 2008 | Integrating Delegation with the Formal Core RBAC Model. Ali E. Abdallah, Hassan Takabi |
| 2008 | Key Distribution Using Dual Quantum Channels. Di Jin, Pramode K. Verma, Stamatios V. Kartalopoulos |
| 2008 | LoSS Detection Approach Based on ESOSS and ASOSS Models. Mohd. Foad Rohani, Mohd Aizaini Maarof, Ali Selamat, Houssain Kettani |
| 2008 | Managing Reputation over MANETs. Giampaolo Bella, Gianpiero Costantino, Salvatore Riccobene |
| 2008 | Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems. Václav Snásel, Jan Platos, Pavel Krömer, Ajith Abraham |
| 2008 | Network Level Privacy for Wireless Sensor Networks. Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee |
| 2008 | Operator-Centric and Adaptive Intrusion Detection. Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Erland Jonsson |
| 2008 | PHAL-256 - Parameterized Hash Algorithm. Przemyslaw Rodwald, Janusz Stoklosa |
| 2008 | Persian/Arabic Unicode Text Steganography. Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza |
| 2008 | Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy Massimiliano Rak, Ajith Abraham, Valentina Casola |
| 2008 | Provenance Tracking with Bit Vectors. Siddharta S. Gadang, Brajendra Panda, Joseph E. Hoag |
| 2008 | Quantum Key Distribution Based on Multi-qubit Hadamard Matrices. Dazu Huang, Zhigang Chen |
| 2008 | Realistic Threats to Self-Enforcing Privacy. Giampaolo Bella, Francesco Librizzi, Salvatore Riccobene |
| 2008 | Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol. Mohamed Abid, Hossam Afifi |
| 2008 | Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network. Shu Yun Lim, Meng-Hui Lim, Sanggon Lee, Hoonjae Lee |
| 2008 | Security Analysis of Temporal-RBAC Using Timed Automata. Samrat Mondal, Shamik Sural |
| 2008 | Semantics-Driven Introspection in a Virtual Environment. Francesco Tamberi, Dario Maggiari, Daniele Sgandurra, Fabrizio Baiardi |
| 2008 | Skin Segmentation Using Color Distance Map and Water-Flow Property. Mohammad Abdullah-Al-Wadud, Oksam Chae |
| 2008 | Speaker Identification by Multi-Frame Generative Models. Donato Impedovo, Mario Refice |
| 2008 | Steganography in Textiles. Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza |
| 2008 | Systematic Website Verification for Privacy Protection. Ji-Hee Jeoung, Eun-Ji Shin, Seng-Phil Hong, Sung-Hoon Kim, In-Ho Kim, Min-Woo Lee |
| 2008 | Threshold Proxy Signature Scheme with Strong Real-Time Efficiency. Xiaoming Wang, Huoyan Chen |
| 2008 | Web Application Attack Prevention for Tiered Internet Services. Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh |