| 2008 | A Bootstrap Attack on Digital Watermarks in the Frequency Domain. Sam Behseta, Charles Lam, Robert L. Webb |
| 2008 | A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. Lijun Liao, Jörg Schwenk |
| 2008 | Access with Fast Batch Verifiable Anonymous Credentials. Ke Zeng |
| 2008 | Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.. Nicolas T. Courtois, Blandine Debraize |
| 2008 | Analysis of Two Attacks on Reduced-Round Versions of the SMS4. Deniz Toz, Orr Dunkelman |
| 2008 | Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. Jiali Choy, Khoongming Khoo, Chuan-Wen Loe |
| 2008 | Attestation: Evidence and Trust. George Coker, Joshua D. Guttman, Peter A. Loscocco, Justin Sheehy, Brian T. Sniffen |
| 2008 | Automated Device Pairing for Asymmetric Pairing Scenarios. Nitesh Saxena, Md. Borhan Uddin |
| 2008 | Beyond User-to-User Access Control for Online Social Networks. Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn |
| 2008 | BinHunt: Automatically Finding Semantic Differences in Binary Programs. Debin Gao, Michael K. Reiter, Dawn Xiaodong Song |
| 2008 | Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval. Mohamed Layouni, Maki Yoshida, Shingo Okamura |
| 2008 | Embedding Renewable Cryptographic Keys into Continuous Noisy Data. Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis |
| 2008 | Enhancing Java ME Security Support with Resource Usage Monitoring. Alessandro Castrucci, Fabio Martinelli, Paolo Mori, Francesco Roperti |
| 2008 | Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes. Rabia Sirhindi, Saeed Murtaza, Mehreen Afzal |
| 2008 | Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings Liqun Chen, Mark Dermot Ryan, Guilin Wang |
| 2008 | Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
| 2008 | Method for Detecting Vulnerability to Doubling Attacks. Chong Hee Kim, Jean-Jacques Quisquater |
| 2008 | Pseudo-randomness Inside Web Browsers. Zhi Guan, Long Zhang, Zhong Chen, Xianghao Nan |
| 2008 | Publicly Verifiable Remote Data Integrity. Ke Zeng |
| 2008 | Quantifying Timing Leaks and Cost Optimisation. Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky |
| 2008 | Reusability of Functionality-Based Application Confinement Policy Abstractions. Z. Cliffe Schreuders, Christian Payne |
| 2008 | Revocation Schemes for Delegation Licences. Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula |
| 2008 | Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Praveen Gauravaram, Katsuyuki Okeya |
| 2008 | Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study. Mehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohamed Mejri |
| 2008 | Threat Modelling in User Performed Authentication. Xun Dong, John A. Clark, Jeremy L. Jacob |
| 2008 | Towards Role Based Trust Management without Distributed Searching of Credentials. Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi |
| 2008 | Towards an Information Theoretic Analysis of Searchable Encryption. Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker |
| 2008 | Unclonable Lightweight Authentication Scheme. Ghaith Hammouri, Erdinç Öztürk, Berk Birand, Berk Sunar |
| 2008 | Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. Henrich Christopher Pöhls |