| 2010 | A Deniable Group Key Establishment Protocol in the Standard Model. Yazhe Zhang, Kunpeng Wang, Bao Li |
| 2010 | A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. Jiageng Chen, Atsuko Miyaji |
| 2010 | A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables. Lin Xu, Dongdai Lin, Xin Li |
| 2010 | A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim |
| 2010 | A Trustworthy ID Management Mechanism in Open Market. InKyung Jeun, Dongho Won |
| 2010 | Accelerating Inverse of Lei Xu, Dongdai Lin |
| 2010 | An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification. Jacob C. N. Schuldt, Kanta Matsuura |
| 2010 | Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards. Youngsook Lee, Hyungkyu Yang, Dongho Won |
| 2010 | Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis. Chiew Kang Leng, Josef Pieprzyk |
| 2010 | BioID: Biometric-Based Identity Management. Byoung-Jin Han, Donghwi Shin, Hyoung-Jin Lim, InKyung Jeun, Hyun-Chul Jung |
| 2010 | Certificateless KEM and Hybrid Signcryption Schemes Revisited. S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
| 2010 | Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis. Zhen Wang, Xiaozhe Wang, Shuqin Fan |
| 2010 | Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles. Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan |
| 2010 | Host-Based Security Sensor Integrity in Multiprocessing Environments. Thomas Richard McEvoy, Stephen D. Wolthusen |
| 2010 | Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. Jiazhe Chen, Keting Jia |
| 2010 | Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang |
| 2010 | Integral Attacks on Reduced-Round ARIA Block Cipher. Yanjun Li, Wenling Wu, Lei Zhang |
| 2010 | Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes. Farshid Farhat, Mohammad Reza Pakravan, Mahmoud Salmasizadeh, Mohammad Reza Aref |
| 2010 | Mitigating the Malicious Trust Expansion in Social Network Service. Daren Zha, Jiwu Jing, Le Kang |
| 2010 | On Fast and Approximate Attack Tree Computations. Aivo Jürgenson, Jan Willemson |
| 2010 | On the Security of NOEKEON against Side Channel Cube Attacks. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry |
| 2010 | Privacy Preserving of Trust Management Credentials Based on Trusted Computing. Bin Wu, Dengguo Feng, Meijiao Duan |
| 2010 | Protection Profile for Secure E-Voting Systems. Kwang-Woo Lee, Yunho Lee, Dongho Won, Seungjoo Kim |
| 2010 | Rate-Based Watermark Traceback: A New Approach. Zongbin Liu, Jiwu Jing, Peng Liu |
| 2010 | Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk. Zhuo Tang, Shaohua Zhang, Kenli Li, Benming Feng |
| 2010 | The Elliptic Curve Discrete Logarithm Problems over the Masaya Yasuda |
| 2010 | Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting. Hui Li, Chuankun Wu, Lingbo Wei |
| 2010 | Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu |
| 2010 | Width-3 Joint Sparse Form. Katsuyuki Okeya, Hidehiro Katou, Yasuyuki Nogami |