| 2012 | A General Construction for 1-Round δ-RMT and (0, δ)-SMT. Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang |
| 2012 | A New Framework for Privacy of RFID Path Authentication. Shaoying Cai, Robert H. Deng, Yingjiu Li, Yunlei Zhao |
| 2012 | A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring. Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin |
| 2012 | A Prefiltering Approach to Regular Expression Matching for Network Security Systems. Tingwen Liu, Yong Sun, Alex X. Liu, Li Guo, Binxing Fang |
| 2012 | ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, Evangelos P. Markatos |
| 2012 | Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings Feng Bao, Pierangela Samarati, Jianying Zhou |
| 2012 | Authenticated Encryption: How Reordering Can Impact Performance. Basel Alomair |
| 2012 | Breaking an Animated CAPTCHA Scheme. Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo |
| 2012 | Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens. Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung |
| 2012 | Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys. Yuki Asano, Shingo Yanagihara, Tetsu Iwata |
| 2012 | Detecting Social Spam Campaigns on Twitter. Zi Chu, Indra Widjaja, Haining Wang |
| 2012 | Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions. Yu Sasaki, Lei Wang |
| 2012 | Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers. Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu |
| 2012 | GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol. Panagiotis Rizomiliotis, Stefanos Gritzalis |
| 2012 | Identity-Based Extractable Hash Proofs and Their Applications. Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao |
| 2012 | Inner-Product Lossy Trapdoor Functions and Applications. Xiang Xie, Rui Xue, Rui Zhang |
| 2012 | Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud. Boyang Wang, Baochun Li, Hui Li |
| 2012 | Length-Doubling Ciphers and Tweakable Ciphers. Haibin Zhang |
| 2012 | Linear Fault Analysis of Block Ciphers. Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li |
| 2012 | On Structural Signatures for Tree Data Structures. Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer |
| 2012 | On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification. Afonso Arriaga, Manuel Barbosa, Pooya Farshim |
| 2012 | PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance. Gilles Piret, Thomas Roche, Claude Carlet |
| 2012 | Private Computation of Spatial and Temporal Power Consumption with Smart Meters. Zekeriya Erkin, Gene Tsudik |
| 2012 | RIKE: Using Revocable Identities to Support Key Escrow in PKIs. Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao |
| 2012 | SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment. Sherman S. M. Chow, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu |
| 2012 | Secure Accumulators from Euclidean Rings without Trusted Setup. Helger Lipmaa |
| 2012 | Security Analysis of a Multi-factor Authenticated Key Exchange Protocol. Feng Hao, Dylan Clarke |
| 2012 | Security Enhancements by OR-Proof in Identity-Based Identification. Atsushi Fujioka, Taiichi Saito, Keita Xagawa |
| 2012 | The Shy Mayor: Private Badges in GeoSocial Networks. Bogdan Carbunar, Radu Sion, Rahul Potharaju, Moussa Ehsan |
| 2012 | Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations. Minh Tran, Xinshu Dong, Zhenkai Liang, Xuxian Jiang |
| 2012 | TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks. Tilo Müller, Benjamin Taubmann, Felix C. Freiling |
| 2012 | Wide Collisions in Practice. Xin Ye, Thomas Eisenbarth |
| 2012 | Zero-Value Point Attacks on Kummer-Based Cryptosystem. Fangguo Zhang, Qiping Lin, Shengli Liu |
| 2012 | iHTTP: Efficient Authentication of Non-confidential HTTP Traffic. Jason Gionta, Peng Ning, Xiaolan Zhang |