| 2011 | A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware. Ning Ding, Dawu Gu |
| 2011 | A Model for Constraint and Delegation Management. Quan Pham, Jason Reid, Ed Dawson |
| 2011 | A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols. An Wang, Zheng Li, Xianwen Yang, Yanyan Yu |
| 2011 | A Novel Group Signature Scheme Based on MPKC. Guangdong Yang, Shaohua Tang, Li Yang |
| 2011 | A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme. Mahabir Prasad Jhanwar |
| 2011 | An Efficient Group-Based Secret Sharing Scheme. Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian |
| 2011 | Analysis and Improvement of an Authenticated Key Exchange Protocol. Jiaxin Pan, Libin Wang, Changshe Ma |
| 2011 | Another Elliptic Curve Model for Faster Pairing Computation. Lijun Zhang, Kunpeng Wang, Hong Wang, Dingfeng Ye |
| 2011 | BCBC: A More Efficient MAC Algorithm. Bo Liang, Wenling Wu, Liting Zhang |
| 2011 | Encryption Simulatability Reconsidered. Yamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia |
| 2011 | Fully Secure Cipertext-Policy Hiding CP-ABE. Junzuo Lai, Robert H. Deng, Yingjiu Li |
| 2011 | Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. Yu Chen, Liqun Chen, Zhong Chen |
| 2011 | Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host. Jonghoon Kwon, Jehyun Lee, Heejo Lee |
| 2011 | Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing. Jun-e Liu, Zhiguo Wan, Ming Gu |
| 2011 | How to Characterize Side-Channel Leakages More Accurately? Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng |
| 2011 | Improving BDD Cryptosystems in General Lattices. Michael Rose, Thomas Plantard, Willy Susilo |
| 2011 | Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings Feng Bao, Jian Weng |
| 2011 | Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme. Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin |
| 2011 | Lightweight Delegated Subset Test with Privacy Protection. Xuhua Zhou, Xuhua Ding, Kefei Chen |
| 2011 | Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. Yongzhuang Wei, Jiqiang Lu, Yupu Hu |
| 2011 | New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen |
| 2011 | New Impossible Differential and Known-Key Distinguishers for the 3D Cipher. Jorge Nakahara Jr. |
| 2011 | Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries. Huafei Zhu |
| 2011 | On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs. Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng |
| 2011 | Policy-Based Authentication for Mobile Agents. Yikai Wang, Yi Mu, Minjie Zhang |
| 2011 | Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules. Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu |
| 2011 | Privacy Enhanced Access Control by Means of Policy Blinding. Saeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova |
| 2011 | Public-Key Encryptions Tolerating Adaptive and Composable Adversaries. Huafei Zhu |
| 2011 | Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. Fangming Zhao, Takashi Nishide, Kouichi Sakurai |
| 2011 | Sanitizing Microdata without Leak: Combining Preventive and Curative Actions. Tristan Allard, Benjamin Nguyen, Philippe Pucheral |
| 2011 | Short Convertible Undeniable Signature in the Standard Model. Qiong Huang, Duncan S. Wong |
| 2011 | Toward Trustworthy Clouds' Internet Scale Critical Infrastructure. Imad M. Abbadi |
| 2011 | Traitor Tracing against Public Collaboration. Xingwen Zhao, Fangguo Zhang |