| 2012 | A Comparative Study of Malware Family Classification. Md. Rafiqul Islam, Irfan Altas |
| 2012 | A Fine-Grained Classification Approach for the Packed Malicious Code. Shanqing Guo, Shuangshuang Li, Yan Yu, Anlei Hu, Tao Ban |
| 2012 | A Generic Approach for Providing Revocation Support in Secret Handshake. Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou |
| 2012 | A Key Sharing Fuzzy Vault Scheme. Lin You, Mengsheng Fan, Jie Lu, Shengguo Wang, Fenghai Li |
| 2012 | A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack. Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, Dongdai Lin |
| 2012 | A New Version of McEliece PKC Based on Convolutional Codes. Carl Löndahl, Thomas Johansson |
| 2012 | A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains. Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen |
| 2012 | Acceleration of Composite Order Bilinear Pairing on Graphics Hardware. Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu-Ming Yiu |
| 2012 | An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy. Anjia Yang, Yunhui Zhuang, Duncan S. Wong |
| 2012 | Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack. Zhenqi Li, Bin Zhang, Yao Lu, Jing Zou, Dongdai Lin |
| 2012 | Audio Steganalysis Based on Lossless Data-Compression Techniques. Fatiha Djebbar, Beghdad Ayad |
| 2012 | Comparison between Side-Channel Analysis Distinguishers. Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger |
| 2012 | Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model. Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu-Ming Yiu, Sihan Qing |
| 2012 | Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain. Wilko Henecka, Nigel G. Bean, Matthew Roughan |
| 2012 | Cookie-Proxy: A Scheme to Prevent SSLStrip Attack. Sendong Zhao, Ding Wang, Sicheng Zhao, Wu Yang, Chunguang Ma |
| 2012 | Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
| 2012 | Countermeasures on Application Level Low-Rate Denial-of-Service Attack. Yajuan Tang |
| 2012 | Cryptanalysis of Multi-Prime RSA with Small Prime Difference. Hatem M. Bahig, Ashraf Bhery, Dieaa I. Nassr |
| 2012 | Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis. Ruoxu Zhao, Dawu Gu, Juanru Li, Hui Liu |
| 2012 | Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer. Ting Dai, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang |
| 2012 | Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography. Yan Zhang, Dengguo Feng |
| 2012 | Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding. Daewon Kim, Byoung-Koo Kim, Ikkyun Kim, Jeongnyeo Kim, Hyunsook Cho |
| 2012 | Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme. Yang-Wai Chow, Willy Susilo, Duncan S. Wong |
| 2012 | Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme. Yuxin Meng, Wenjuan Li |
| 2012 | Exploring Mobile Proxies for Better Password Authentication. Nitesh Saxena, Jonathan Voris |
| 2012 | F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances. Huimin Shuai, Wen Tao Zhu |
| 2012 | Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test. Zouheir Trabelsi, Liren Zhang, Safaa Zeidan |
| 2012 | Flexible Attribute-Based Encryption. Seiko Arita |
| 2012 | Forward Secure Attribute-Based Signatures. Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou |
| 2012 | Group Behavior Metrics for P2P Botnet Detection. John Felix Charles Joseph, Ali A. Ghorbani |
| 2012 | Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA. Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu |
| 2012 | Impact of the Revocation Service in PKI Prices. Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juanjo Alins |
| 2012 | Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem. Jun Xu, Lei Hu, Siwei Sun |
| 2012 | Improved Related-Key Differential Attacks on Reduced-Round LBlock. Shusheng Liu, Zheng Gong, Libin Wang |
| 2012 | Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings Tat Wing Chim, Tsz Hon Yuen |
| 2012 | Location Privacy Policy Management System. Arej Muhammed, Dan Lin, Anna Cinzia Squicciarini |
| 2012 | Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles. Yanli Ren, Shuozhong Wang, Xinpeng Zhang |
| 2012 | On Constant-Round Precise Zero-Knowledge. Ning Ding, Dawu Gu |
| 2012 | On Security of Universal Hash Function Based Multiple Authentication. Aysajan Abidin |
| 2012 | Outsourcing Encryption of Attribute-Based Encryption with MapReduce. Jingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen |
| 2012 | Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance. Yan Cao, Qiang Wei, Qingxian Wang |
| 2012 | Perfect Ambiguous Optimistic Fair Exchange. Yang Wang, Man Ho Au, Willy Susilo |
| 2012 | Permission-Based Abnormal Application Detection for Android. Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen |
| 2012 | Privacy Protection in Social Networks Using l-Diversity. Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jian-bin Hu, Zhong Chen |
| 2012 | Privacy-Preserving Noisy Keyword Search in Cloud Computing. Xiaoqiong Pang, Bo Yang, Qiong Huang |
| 2012 | Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition. Yong Liu, Meishan Huang, Bogang Lin |
| 2012 | Security Enhancement of Identity-Based Identification with Reversibility. Atsushi Fujioka, Taiichi Saito, Keita Xagawa |
| 2012 | Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner. Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li, Tin Wing Mui, Yu Hin Tsang, Chun Kin Kwok, Kwun Yin Yu |
| 2012 | Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data. Vrizlynn L. L. Thing, Darell J. J. Tan |
| 2012 | Taint Analysis of Security Code in the KLEE Symbolic Execution Engine. Ricardo Corin, Felipe Andrés Manzano |