| 2011 | 1-out-of-2 signature. Miroslaw Kutylowski, Jun Shao |
| 2011 | A new and extended fault analysis on RSA. Cai-Sen Chen, Tao Wang |
| 2011 | A software-based root-of-trust primitive on multicore platforms. Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng, Tieyan Li |
| 2011 | A statistical approach to botnet virulence estimation. Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani |
| 2011 | An efficient mobile PACE implementation. Alexander Wiesmaier, Moritz Horsch, Johannes Braun, Franziskus Kiefer, Detlef Hühnlein, Falko Strenzke, Johannes Buchmann |
| 2011 | An integrated approach to cryptographic mitigation of denial-of-service attacks. Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto |
| 2011 | An ontology- and Bayesian-based approach for determining threat probabilities. Stefan Fenz |
| 2011 | Attack on the GridCode one-time password. Ian M. Molloy, Ninghui Li |
| 2011 | Attacks against process control systems: risk assessment, detection, and response. Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, Shankar Sastry |
| 2011 | Automatic construction of jump-oriented programming shellcode (on the x86). Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen, Xinchun Yin |
| 2011 | Boosting the scalability of botnet detection using adaptive traffic sampling. Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee, Nick Feamster |
| 2011 | Bounded vector signatures and their applications. Lei Wei, Scott E. Coull, Michael K. Reiter |
| 2011 | Characterizing kernel malware behavior with kernel data access patterns. Junghwan Rhee, Zhiqiang Lin, Dongyan Xu |
| 2011 | Compact identity-based encryption without strong symmetric cipher. Joonsang Baek, Jianying Zhou |
| 2011 | Confidentiality-preserving proof theories for distributed proof systems. Kazuhiro Minami, Nikita Borisov, Marianne Winslett, Adam J. Lee |
| 2011 | Deriving common malware behavior through graph clustering. Young Hee Park, Douglas S. Reeves |
| 2011 | Detecting stealthy malware with inter-structure and imported signatures. Bin Liang, Wei You, Wenchang Shi, Zhaohui Liang |
| 2011 | Diesel: applying privilege separation to database access. Adrienne Porter Felt, Matthew Finifter, Joel Weinberger, David A. Wagner |
| 2011 | EASiER: encryption-based access control in social networks with efficient revocation. Sonia Jahid, Prateek Mittal, Nikita Borisov |
| 2011 | Efficient audit-based compliance for relational data retention. Ragib Hasan, Marianne Winslett |
| 2011 | Efficient computational oblivious transfer using interactive hashing. Kirill Morozov, George Savvides |
| 2011 | Efficient symbolic automated analysis of administrative attribute-based RBAC-policies. Francesco Alberti, Alessandro Armando, Silvio Ranise |
| 2011 | Enhancing the trust of internet routing with lightweight route attestation. Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu |
| 2011 | Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK. Cas Cremers |
| 2011 | Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations. Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry |
| 2011 | Formal modelling and automatic detection of resource exhaustion attacks. Bogdan Groza, Marius Minea |
| 2011 | How to design space efficient revocable IBE from non-monotonic ABE. Huang Lin, Zhenfu Cao, Yuguang Fang, Muxin Zhou, Haojin Zhu |
| 2011 | How to search linear approximation for large non-surjective S-box. Yue Sun, Meiqin Wang, Qiumei Sun |
| 2011 | Identity-based online/offline key encapsulation and encryption. Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou |
| 2011 | Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem. Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi |
| 2011 | Jump-oriented programming: a new class of code-reuse attack. Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Zhenkai Liang |
| 2011 | Leakage resilient eCK-secure key exchange protocol without random oracles. Daisuke Moriyama, Tatsuaki Okamoto |
| 2011 | Malware propagation in online social networks: nature, dynamics, and defense implications. Guanhua Yan, Guanling Chen, Stephan J. Eidenbenz, Nan Li |
| 2011 | Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo |
| 2011 | Multi-authority ciphertext-policy attribute-based encryption with accountability. Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie |
| 2011 | Network scan detection with LQS: a lightweight, quick and stateful algorithm. Mansour Alsaleh, Paul C. van Oorschot |
| 2011 | Non-uniform distributions in quantitative information-flow. Michael Backes, Matthias Berg, Boris Köpf |
| 2011 | On mouse dynamics as a behavioral biometric for authentication. Zach Jorgensen, Ting Yu |
| 2011 | On the effectiveness of anonymizing networks for web search privacy. Sai Teja Peddinti, Nitesh Saxena |
| 2011 | On the invisibility of designated confirmer signatures. Fubiao Xia, Guilin Wang, Rui Xue |
| 2011 | On the security of the identity-based encryption based on DHIES from ASIACCS 2010. Willy Susilo, Joonsang Baek |
| 2011 | Optimal message transmission protocols with flexible parameters. Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Hongsong Shi |
| 2011 | PUF ROKs: a hardware approach to read-once keys. Michael S. Kirkpatrick, Sam Kerr, Elisa Bertino |
| 2011 | Practical affiliation-hiding authentication from improved polynomial interpolation. Mark Manulis, Bertram Poettering |
| 2011 | Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011 Bruce S. N. Cheung, Lucas Chi Kwong Hui, Ravi S. Sandhu, Duncan S. Wong |
| 2011 | Quantified risk-adaptive access control for patient privacy protection in health information systems. Qihua Wang, Hongxia Jin |
| 2011 | ROPdefender: a detection tool to defend against return-oriented programming attacks. Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy |
| 2011 | Receipt-mode trust negotiation: efficient authorization through outsourced interactions. Andrew K. Adams, Adam J. Lee, Daniel Mossé |
| 2011 | Rethinking about guessing attacks. Zhiwei Li, Weichao Wang |
| 2011 | Secure mobile subscription of sensor-encrypted data. Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng |
| 2011 | Self destructive tamper response for software protection. Kazuomi Oishi, Tsutomu Matsumoto |
| 2011 | Self-certified ring signatures. Nan Li, Yi Mu, Willy Susilo, Fuchun Guo |
| 2011 | Separation of duties as a service. David A. Basin, Samuel J. Burri, Günter Karjoth |
| 2011 | Server-aided signatures verification secure against collusion attack. Sherman S. M. Chow, Man Ho Au, Willy Susilo |
| 2011 | Stronger security model of group key agreement. Jianjie Zhao, Dawu Gu, M. Choudary Gorantla |
| 2011 | Strongly secure certificateless key exchange without pairing. Guomin Yang, Chik How Tan |
| 2011 | Threshold ring signature without random oracles. Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou |
| 2011 | Towards a binary integrity system for windows. Yongzheng Wu, Roland H. C. Yap |
| 2011 | Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper. Elisa Bertino, Gabriel Ghinita |
| 2011 | Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh |
| 2011 | WebPatrol: automated collection and replay of web-based malware scenarios. Kevin Zhijie Chen, Guofei Gu, Jianwei Zhuge, Jose Nazario, Xinhui Han |