| 2010 | A Framework for the Sound Specification of Cryptographic Tasks. Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou |
| 2010 | A Game-Based Definition of Coercion-Resistance and Its Applications. Ralf Küsters, Tomasz Truderung, Andreas Vogt |
| 2010 | A Machine-Checked Formalization of Sigma-Protocols. Gilles Barthe, Daniel Hedin, Santiago Zanella-Béguelin, Benjamin Grégoire, Sylvain Heraud |
| 2010 | Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan |
| 2010 | Approximation and Randomization for Quantitative Information-Flow Analysis. Boris Köpf, Andrey Rybalchenko |
| 2010 | Automating Open Bisimulation Checking for the Spi Calculus. Alwen Tiu, Jeremy E. Dawson |
| 2010 | Constraining Credential Usage in Logic-Based Access Control. Lujo Bauer, Limin Jia, Divya Sharma |
| 2010 | Dynamic vs. Static Flow-Sensitive Security Analysis. Alejandro Russo, Andrei Sabelfeld |
| 2010 | Formal Verification of Privacy for RFID Systems. Mayla Brusò, Konstantinos Chatzikokolakis, Jerry den Hartog |
| 2010 | Impossibility Results for Secret Establishment. Benedikt Schmidt, Patrick Schaller, David A. Basin |
| 2010 | Information Flow Monitor Inlining. Andrey Chudnov, David A. Naumann |
| 2010 | Information Flow in Credential Systems. Moritz Y. Becker |
| 2010 | Modeling and Verifying Ad Hoc Routing Protocols. Mathilde Arnaud, Véronique Cortier, Stéphanie Delaune |
| 2010 | On Protection by Layout Randomization. Martín Abadi, Gordon D. Plotkin |
| 2010 | Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom, July 17-19, 2010 |
| 2010 | Protocol Composition for Arbitrary Primitives. Stefan Ciobaca, Véronique Cortier |
| 2010 | Quantification of Integrity. Michael R. Clarkson, Fred B. Schneider |
| 2010 | Quantitative Information Flow - Verification Hardness and Possibilities. Hirotoshi Yasuoka, Tachio Terauchi |
| 2010 | Required Information Release. Stephen Chong |
| 2010 | Robustness Guarantees for Anonymity. Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk, Bogdan Warinschi |
| 2010 | Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs. Simon Meier, Cas Cremers, David A. Basin |
| 2010 | Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. Adam J. Lee, Ting Yu |
| 2010 | Towards a Formal Foundation of Web Security. Devdatta Akhawe, Adam Barth, Peifung E. Lam, John C. Mitchell, Dawn Song |
| 2010 | Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks. Boris Köpf, Geoffrey Smith |