| 2011 | A Multi-compositional Enforcement on Information Flow Security. Cong Sun, Ennan Zhai, Zhong Chen, Jianfeng Ma |
| 2011 | A Note on a Privacy-Preserving Distance-Bounding Protocol. Jean-Philippe Aumasson, Aikaterini Mitrokotsa, Pedro Peris-Lopez |
| 2011 | A Novel Pyramidal Dual-Tree Directional Filter Bank Domain Color Image Watermarking Algorithm. Panpan Niu, Xiangyang Wang, Mingyu Lu |
| 2011 | A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure. Yuyin Yu, Mingsheng Wang |
| 2011 | A Unified Security Framework for Multi-domain Wireless Mesh Networks. Ze Wang, Maode Ma, Wenju Liu, Xixi Wei |
| 2011 | A Variant of Boyen-Waters Anonymous IBE Scheme. Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing |
| 2011 | An Efficient Finger-Knuckle-Print Based Recognition System Fusing SIFT and SURF Matching Scores. G. S. Badrinath, Aditya Nigam, Phalguni Gupta |
| 2011 | Analyzing the Performance of Dither Modulation in Presence of Composite Attacks. Xinshan Zhu |
| 2011 | Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao |
| 2011 | Behavior Analysis-Based Dynamic Trust Measurement Model. Dan Wang, Xiaodong Zhou, Wenbing Zhao |
| 2011 | Collision Attack for the Hash Function Extended MD4. Gaoli Wang |
| 2011 | Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles. Xinfeng Lei, Rui Xue, Ting Yu |
| 2011 | Delegable Provable Data Possession for Remote Data in the Clouds. Shiuan-Tzuo Shen, Wen-Guey Tzeng |
| 2011 | Detection for Multiplicative Watermarking in DCT Domain by Cauchy Model. Xiang Yin, Shuoling Peng, Xinshan Zhu |
| 2011 | Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA. Lei Wang, Jiwu Jing, Zongbin Liu, Lingchen Zhang, Wuqiong Pan |
| 2011 | Extension of Barreto-Voloch Root Extraction Method. Zhengjun Cao, Xiao Fan |
| 2011 | First Differential Attack on Full 32-Round GOST. Nicolas T. Courtois, Michal Misztal |
| 2011 | Forward Secure Ring Signature without Random Oracles. Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou |
| 2011 | HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming. Jun Jiang, Xiaoqi Jia, Dengguo Feng, Shengzhi Zhang, Peng Liu |
| 2011 | Ideal Secret Sharing Schemes with Share Selectability. Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi |
| 2011 | Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications. Wenhao Wang, Dongdai Lin, Zhenqi Li, Tianze Wang |
| 2011 | Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu |
| 2011 | Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha. Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake |
| 2011 | Lightweight RFID Mutual Authentication Protocol against Feasible Problems. Yongming Jin, Huiping Sun, Wei Xin, Song Luo, Zhong Chen |
| 2011 | Linear Cryptanalysis of ARIA Block Cipher. Zhiqiang Liu, Dawu Gu, Ya Liu, Juanru Li, Wei Li |
| 2011 | Minimising Anonymity Loss in Anonymity Networks under DoS Attacks. Mu Yang, Vladimiro Sassone |
| 2011 | Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu |
| 2011 | Non-interactive Opening for Ciphertexts Encrypted by Shared Keys. Jiageng Chen, Keita Emura, Atsuko Miyaji |
| 2011 | Ontology Model-Based Static Analysis of Security Vulnerabilities. Lian Yu, Shizhong Wu, Tao Guo, Guowei Dong, Cheng-Cheng Wan, Yin-Hang Jing |
| 2011 | Preserving Security and Privacy in Large-Scale VANETs. Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Lei Zhang |
| 2011 | Ring Signature Schemes from Lattice Basis Delegation. Jin Wang, Bo Sun |
| 2011 | Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation. Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani |
| 2011 | Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean Functions. Yusong Du, Fangguo Zhang |
| 2011 | Unconditionally Secure Oblivious Transfer Based on Channel Delays. Kai-Yuen Cheong, Atsuko Miyaji |