| 2010 | A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider |
| 2010 | A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. Guang Xiang, Bryan A. Pendleton, Jason I. Hong, Carolyn P. Rosé |
| 2010 | A New Framework for RFID Privacy. Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao |
| 2010 | A Service Dependency Model for Cost-Sensitive Intrusion Response. Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar |
| 2010 | A Theory of Runtime Enforcement, with Results. Jay Ligatti, Srikar Reddy |
| 2010 | An Authorization Framework Resilient to Policy Evaluation Failures. Jason Crampton, Michael Huth |
| 2010 | Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang |
| 2010 | Caught in the Maze of Security Standards. Jan Meier, Dieter Gollmann |
| 2010 | Complexity of Anonymity for Security Protocols. Ferucio Laurentiu Tiplea, Loredana Vamanu, Cosmin Vârlan |
| 2010 | Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou |
| 2010 | D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. Alexandros Kapravelos, Iasonas Polakis, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos |
| 2010 | DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert |
| 2010 | Efficient Multi-dimensional Key Management in Broadcast Services. Marina Blanton, Keith B. Frikken |
| 2010 | Election Verifiability in Electronic Voting Protocols. Steve Kremer, Mark Ryan, Ben Smyth |
| 2010 | Enforcing Secure Object Initialization in Java. Laurent Hubert, Thomas P. Jensen, Vincent Monfort, David Pichardie |
| 2010 | Evaluating Adversarial Partitions. Andreas Pashalidis, Stefan Schiffner |
| 2010 | Expressive, Efficient and Obfuscation Resilient Behavior Based IDS. Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh |
| 2010 | Flexible Scheduler-Independent Security. Heiko Mantel, Henning Sudbrock |
| 2010 | Formal Analysis of Privacy for Vehicular Mix-Zones. Morten Dahl, Stéphanie Delaune, Graham Steel |
| 2010 | IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, Wei Zou |
| 2010 | Kamouflage: Loss-Resistant Password Management. Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh |
| 2010 | Low-Cost Client Puzzles Based on Modular Exponentiation. Ghassan Karame, Srdjan Capkun |
| 2010 | Modeling and Analyzing Security in the Presence of Compromising Adversaries. David A. Basin, Cas Cremers |
| 2010 | On Bounding Problems of Quantitative Information Flow. Hirotoshi Yasuoka, Tachio Terauchi |
| 2010 | On E-Vote Integrity in the Case of Malicious Voter Computers. Sven Heiberg, Helger Lipmaa, Filip van Laenen |
| 2010 | On the Secrecy of Spread-Spectrum Flow Watermarks. Xiapu Luo, Junjie Zhang, Roberto Perdisci, Wenke Lee |
| 2010 | Optimistic Fair Exchange with Multiple Arbiters. Alptekin Küpçü, Anna Lysyanskaya |
| 2010 | Pretty Good Democracy for More Expressive Voting Schemes. James Heather, Peter Y. A. Ryan, Vanessa Teague |
| 2010 | Privacy-Preserving, Taxable Bank Accounts. Elli Androulaki, Binh Vo, Steven M. Bellovin |
| 2010 | Providing Mobile Users' Anonymity in Hybrid Networks. Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou |
| 2010 | RatFish: A File Sharing Protocol Provably Secure against Rational Users. Michael Backes, Oana Ciobotaru, Anton Krohmer |
| 2010 | Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. Rishab Nithyanand, Gene Tsudik, Ersin Uzun |
| 2010 | Secure Code Update for Embedded Devices via Proofs of Secure Erasure. Daniele Perito, Gene Tsudik |
| 2010 | Secure Multiparty Linear Programming Using Fixed-Point Arithmetic. Octavian Catrina, Sebastiaan de Hoogh |
| 2010 | Sequential Protocol Composition in Maude-NPA. Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago |
| 2010 | Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou |
| 2010 | Speaker Recognition in Encrypted Voice Streams. Michael Backes, Goran Doychev, Markus Dürmuth, Boris Köpf |
| 2010 | Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis |
| 2010 | User-Role Reachability Analysis of Evolving Administrative Role Based Access Control. Mikhail I. Gofman, Ruiqi Luo, Ping Yang |
| 2010 | Verifying Security Property of Peer-to-Peer Systems Using CSP. Tien Tuan Anh Dinh, Mark Ryan |
| 2010 | Web Browser History Detection as a Real-World Privacy Threat. Artur Janc, Lukasz Olejnik |
| 2010 | Website Fingerprinting and Identification Using Ordered Feature Sequences. Liming Lu, Ee-Chien Chang, Mun Choon Chan |