| 2010 | A New Method for Formalizing Optimistic Fair Exchange Protocols. Ming Chen, Kaigui Wu, Jie Xu, Pan He |
| 2010 | A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms. Kurt Dietrich, Johannes Winter |
| 2010 | A Trust-Based IDS for the AODV Protocol. Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent |
| 2010 | A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks. Jaydip Sen |
| 2010 | A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Wenjing Jia, Wei-Chang Yeh |
| 2010 | An Agent-Mediated Fair Exchange Protocol. Gerard Draper-Gil, Jianying Zhou, Josep-Lluís Ferrer-Gomila |
| 2010 | Anonymity and Verifiability in Voting: Understanding (Un)Linkability. Lucie Langer, Hugo Jonker, Wolter Pieters |
| 2010 | Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis. Kai Chen, Yifeng Lian, Yingjun Zhang |
| 2010 | CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization. Flavio Lombardi, Roberto Di Pietro |
| 2010 | Ciphertext Policy Attribute-Based Proxy Re-encryption. Song Luo, Jian-bin Hu, Zhong Chen |
| 2010 | Compromise-Resilient Anti-jamming for Wireless Sensor Networks. Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao |
| 2010 | Consecutive S-box Lookups: A Timing Attack on SNOW 3G. Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio |
| 2010 | Cryptographic Hash Functions: Theory and Practice. Bart Preneel |
| 2010 | Efficient Authentication for Mobile and Pervasive Computing. Basel Alomair, Radha Poovendran |
| 2010 | Experimental Threat Model Reuse with Misuse Case Diagrams. Jostein Jensen, Inger Anne Tøndel, Per Håkon Meland |
| 2010 | Federated Secret Handshakes with Support for Revocation. Alessandro Sorniotti, Refik Molva |
| 2010 | Fine-Grained Disclosure of Access Policies. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, Mario Verdicchio |
| 2010 | Horizontal Correlation Analysis on Exponentiation. Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil |
| 2010 | Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks. Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo |
| 2010 | IDS Alert Visualization and Monitoring through Heuristic Host Selection. Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani |
| 2010 | Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto |
| 2010 | Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings Miguel Soriano, Sihan Qing, Javier López |
| 2010 | Manger's Attack Revisited. Falko Strenzke |
| 2010 | On Practical Second-Order Power Analysis Attacks for Block Ciphers. Renato Menicocci, Andrea Simonetti, Giuseppe Scotti, Alessandro Trifiletti |
| 2010 | Proving Coercion-Resistance of Scantegrity II. Ralf Küsters, Tomasz Truderung, Andreas Vogt |
| 2010 | Return-Oriented Rootkit without Returns (on the x86). Ping Chen, Xiao Xing, Bing Mao, Li Xie |
| 2010 | Rewriting of SPARQL/Update Queries for Securing Data Access. Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci |
| 2010 | SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez |
| 2010 | Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol. Talal Alharbi, Abdullah Mohammed Almuhaideb, Phu Dung Le |
| 2010 | Security Enhancement and Modular Treatment towards Authenticated Key Exchange. Jiaxin Pan, Libin Wang, Changshe Ma |
| 2010 | Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts. Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer |
| 2010 | Time Warp: How Time Affects Privacy in LBSs. Luciana Marconi, Roberto Di Pietro, Bruno Crispo, Mauro Conti |
| 2010 | Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme. Mehrdad Nojoumian, Douglas R. Stinson |