| 2008 | A block cipher based pseudo random number generator secure against side-channel key recovery. Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung |
| 2008 | A general model of probabilistic packet marking for IP traceback. Liming Lu, Mun Choon Chan, Ee-Chien Chang |
| 2008 | A practical mimicry attack against powerful system-call monitors. Chetan Parampalli, R. Sekar, Rob Johnson |
| 2008 | A short anonymously revocable group signature scheme from decision linear assumption. Toru Nakanishi, Nobuo Funabiki |
| 2008 | A strict evaluation method on the number of conditions for the SHA-1 collision search. Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta |
| 2008 | An integrated framework for security protocol analysis. Marcin Olszewski, Lukasz Cyra |
| 2008 | An overview of side channel analysis attacks. Thanh-Ha Le, Cécile Canovas, Jessy Clédière |
| 2008 | Avoiding timing channels in fixed-priority schedulers. Marcus Völp, Claude-Joachim Hamann, Hermann Härtig |
| 2008 | CMV: automatic verification of complete mediation for java virtual machines. A. Prasad Sistla, V. N. Venkatakrishnan, Michelle Zhou, Hilary Branske |
| 2008 | Certificateless signcryption. Manuel Barbosa, Pooya Farshim |
| 2008 | Computationally sound mechanized proofs for basic and public-key Kerberos. Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay |
| 2008 | Confronting a mobile adversary in unattended sensor networks. Gene Tsudik |
| 2008 | Controlled privacy preserving keyword search. Stephen S. Yau, Yin Yin |
| 2008 | Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee |
| 2008 | Detecting VoIP based DoS attacks at the public safety answering point. Christoph Fuchs, Nils Aschenbruck, Felix Leder, Peter Martini |
| 2008 | Efficient designated confirmer signature from bilinear pairings. Fangguo Zhang, Xiaofeng Chen, Baodian Wei |
| 2008 | Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. Stuart Haber, Yasuo Hatano, Yoshinori Honda, William G. Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao |
| 2008 | Exploiting social networks for threshold signing: attack-resilience vs. availability. Shouhuai Xu, Xiaohu Li, T. Paul Parker |
| 2008 | HMAC is a randomness extractor and applications to TLS. Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer |
| 2008 | Mechanisms for usage control. Alexander Pretschner, Manuel Hilty, David A. Basin, Christian Schaefer, Thomas Walter |
| 2008 | Mutual authentication in RFID: security and privacy. Radu-Ioan Paise, Serge Vaudenay |
| 2008 | Non-interactive conference key distribution and its applications. Reihaneh Safavi-Naini, Shaoquan Jiang |
| 2008 | On spatio-temporal constraints and inheritance in role-based access control. Liang Chen, Jason Crampton |
| 2008 | On the protocol composition logic PCL. Cas Cremers |
| 2008 | Online subscriptions with anonymous access. Marina Blanton |
| 2008 | Practical forward secure sequential aggregate signatures. Di Ma |
| 2008 | Principled reasoning and practical applications of alert fusion in intrusion detection systems. Guofei Gu, Alvaro A. Cárdenas, Wenke Lee |
| 2008 | Private combinatorial group testing. Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho |
| 2008 | Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008 Masayuki Abe, Virgil D. Gligor |
| 2008 | Prototyping security test objects for use with advanced biometric authentication systems. Tsutomu Matsumoto |
| 2008 | Provably secure browser-based user-aware mutual authentication over TLS. Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk |
| 2008 | Robust, anonymous RFID authentication with constant key-lookup. Mike Burmester, Breno de Medeiros, Rossana Motta |
| 2008 | SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe |
| 2008 | SNAPP: stateless network-authenticated path pinning. Bryan Parno, Adrian Perrig, Dave G. Andersen |
| 2008 | Secure neighbor discovery in wireless networks: formal investigation of possibility. Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux |
| 2008 | Secure slices of insecure programs. Salvador Cavadini |
| 2008 | Securing group key exchange against strong corruptions. Emmanuel Bresson, Mark Manulis |
| 2008 | Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. Alfred Menezes, Berkant Ustaoglu |
| 2008 | Stateful identity-based encryption scheme: faster encryption and decryption. Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata |
| 2008 | Towards an efficient and language-agnostic compliance checker for trust negotiation systems. Adam J. Lee, Marianne Winslett |
| 2008 | Usage control platformization via trustworthy SELinux. Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang |
| 2008 | Verified implementations of the information card federated identity-management protocol. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy |