| 2008 | 1-out-of-. Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
| 2008 | A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval |
| 2008 | A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. Jihwan Lim, Heekuck Oh, Sangjin Kim |
| 2008 | A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. Jong Hwan Park, Dong Hoon Lee |
| 2008 | An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
| 2008 | An On-Line Secure E-Passport Protocol. Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang |
| 2008 | Analysis of Zipper as a Hash Function. Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu |
| 2008 | Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. Patrick P. Tsang, Sean W. Smith |
| 2008 | Computational Soundness of Non-Malleable Commitments. David Galindo, Flavio D. Garcia, Peter van Rossum |
| 2008 | Distributed Private Matching and Set Operations. Qingsong Ye, Huaxiong Wang, Josef Pieprzyk |
| 2008 | Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi |
| 2008 | Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings Liqun Chen, Yi Mu, Willy Susilo |
| 2008 | Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu |
| 2008 | On the Importance of the Key Separation Principle for Different Modes of Operation. Danilo Gligoroski, Suzana Andova, Svein J. Knapskog |
| 2008 | PROBE: A Process Behavior-Based Host Intrusion Prevention System. Minjin Kwon, Kyoochang Jeong, Heejo Lee |
| 2008 | Privacy of Recent RFID Authentication Protocols. Khaled Ouafi, Raphael C.-W. Phan |
| 2008 | Private Query on Encrypted Data in Multi-user Settings. Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang |
| 2008 | RSA Moduli with a Predetermined Portion: Techniques and Applications. Marc Joye |
| 2008 | Rational Secret Sharing with Repeated Games. Shaik Maleka, Amjed Shareef, C. Pandu Rangan |
| 2008 | Secure Computation of the Vector Dominance Problem. Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk |
| 2008 | Secure Cryptographic Precomputation with Insecure Memory. Patrick P. Tsang, Sean W. Smith |
| 2008 | Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. Frederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi |
| 2008 | Securing Peer-to-Peer Distributions for Mobile Devices. André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan |
| 2008 | Square Attack on Reduced-Round Zodiac Cipher. Wen Ji, Lei Hu |
| 2008 | Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. Andrew Brown, Mark Ryan |
| 2008 | Towards Tamper Resistant Code Encryption: Practice and Experience. Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere |
| 2008 | Towards the World-Wide Quantum Network. Quoc-Cuong Le, Patrick Bellot, Akim Demaille |
| 2008 | Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim |
| 2008 | Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs. Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma |
| 2008 | Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. Anongporn Salaiwarakul, Mark Dermot Ryan |