| 2011 | A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds. Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao |
| 2011 | A New RFID Privacy Model. Jens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel |
| 2011 | A Practical Complexity-Theoretic Analysis of Mix Systems. Dang Vinh Pham, Joss Wright, Dogan Kesdogan |
| 2011 | A Systematic Analysis of XSS Sanitization in Web Application Frameworks. Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Eui Chul Richard Shin, Dawn Song |
| 2011 | Adapting Helios for Provable Ballot Privacy. David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi |
| 2011 | Automated Information Flow Analysis of Virtualized Infrastructures. Sören Bleikertz, Thomas Groß, Matthias Schunter, Konrad Eriksson |
| 2011 | Automatic and Precise Client-Side Protection against CSRF Attacks. Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens |
| 2011 | Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings Vijay Atluri, Claudia Díaz |
| 2011 | Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing. Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu |
| 2011 | DriverGuard: A Fine-Grained Protection on I/O Flows. Yueqiang Cheng, Xuhua Ding, Robert H. Deng |
| 2011 | Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms. Amir Herzberg, Ronen Margulies |
| 2011 | Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen |
| 2011 | How to Aggregate the CL Signature Scheme. Dominique Schröder |
| 2011 | Investigating the OpenPGP Web of Trust. Alexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle |
| 2011 | Investigation of Signal and Message Manipulations on the Wireless Channel. Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun |
| 2011 | Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2. Cas Cremers |
| 2011 | Linear Obfuscation to Combat Symbolic Execution. Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao |
| 2011 | Multi-run Security. Arnar Birgisson, Andrei Sabelfeld |
| 2011 | Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective. Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux |
| 2011 | Preventing Web Application Injections with Complementary Character Coding. Raymond Mui, Phyllis G. Frankl |
| 2011 | Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods. Hannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, Christopher Piosecny |
| 2011 | Protecting Private Web Content from Embedded Scripts. Yuchen Zhou, David Evans |
| 2011 | Quantitative Information Flow, with a View. Michele Boreale, Francesca Pampaloni, Michela Paolini |
| 2011 | Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs. Elie Bursztein, Baptiste Gourdin, John C. Mitchell |
| 2011 | Remote Timing Attacks Are Still Practical. Billy Bob Brumley, Nicola Tuveri |
| 2011 | Scalable Analysis of Attack Scenarios. Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian |
| 2011 | Secure Localization Using Dynamic Verifiers. Nashad Ahmed Safa, Saikat Sarkar, Reihaneh Safavi-Naini, Majid Ghaderi |
| 2011 | Secure and Efficient Protocols for Iris and Fingerprint Identification. Marina Blanton, Paolo Gasti |
| 2011 | Socially Constructed Trust for Distributed Authorization. Steve Barker, Valerio Genovese |
| 2011 | Supporting Concurrency in Private Data Outsourcing. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
| 2011 | Time-Storage Trade-Offs for Cryptographically-Enforced Access Control. Jason Crampton |
| 2011 | Timing Is Everything: The Importance of History Detection. Gunnar Kreitz |
| 2011 | To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data. Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen, Haixu Tang, Xiaofeng Wang |
| 2011 | Towards a Mechanism for Incentivating Privacy. Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro |
| 2011 | Usability of Display-Equipped RFID Tags for Security Purposes. Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun |
| 2011 | Who Wrote This Code? Identifying the Authors of Program Binaries. Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller |
| 2011 | WiFiHop - Mitigating the Evil Twin Attack through Multi-hop Detection. Diogo Mónica, Carlos Ribeiro |