| 2011 | Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic |
| 2010 | A Short Signature Scheme from the RSA Family. Ping Yu, Rui Xue |
| 2010 | An Analysis of DepenDNS. Nadhem J. AlFardan, Kenneth G. Paterson |
| 2010 | An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications. Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos |
| 2010 | Artificial Malware Immunization Based on Dynamically Assigned Sense of Self. Xinyuan Wang, Xuxian Jiang |
| 2010 | CRePE: Context-Related Policy Enforcement for Android. Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo |
| 2010 | Crimeware Swindling without Virtual Machines. Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis |
| 2010 | Cryptanalysis of the Convex Hull Click Human Identification Protocol. Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang |
| 2010 | Deciding Recognizability under Dolev-Yao Intruder Model. Zhiwei Li, Weichao Wang |
| 2010 | Double Spending Protection for E-Cash Based on Risk Management. Patricia Everaere, Isabelle Simplot-Ryl, Issa Traoré |
| 2010 | Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups. Jonathan T. Trostle, Andy Parrish |
| 2010 | Efficient Message Space Extension for Automorphic Signatures. Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo |
| 2010 | Efficient Multiplicative Homomorphic E-Voting. Kun Peng, Feng Bao |
| 2010 | Enhancing Security and Privacy in Certified Mail Systems Using Trust Domain Separation. Arne Tauber, Thomas Rössler |
| 2010 | Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets. Georg Neugebauer, Ulrike Meyer, Susanne Wetzel |
| 2010 | Implicit Authentication through Learning User Behavior. Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow |
| 2010 | Improved Collision Attacks on the Reduced-Round Grøstl Hash Function. Kota Ideguchi, Elmar Tischhauser, Bart Preneel |
| 2010 | Improved Distinguishing Attack on Rabbit. Yi Lu, Yvo Desmedt |
| 2010 | Indifferentiable Security Reconsidered: Role of Scheduling. Kazuki Yoneyama |
| 2010 | Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks. Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu |
| 2010 | Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter |
| 2010 | Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation. Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie |
| 2010 | On Privacy Leakage through Silence Suppression. Ye Zhu |
| 2010 | On Side-Channel Resistant Block Cipher Usage. Jorge Guajardo, Bart Mennink |
| 2010 | One-Time Trapdoor One-Way Functions. Julien Cathalo, Christophe Petit |
| 2010 | Privacy-Preserving ECC-Based Grouping Proofs for RFID. Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede |
| 2010 | Privilege Escalation Attacks on Android. Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy |
| 2010 | Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento |
| 2010 | Revisiting the Security of the Alred Design. Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho |
| 2010 | Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents. Özgür Dagdelen, Marc Fischlin |
| 2010 | Security Implications of Crosstalk in Switching CMOS Gates. Geir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes |
| 2010 | Security Reductions of the Second Round SHA-3 Candidates. Elena Andreeva, Bart Mennink, Bart Preneel |
| 2010 | Selective Regular Expression Matching. Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani |
| 2010 | Summary-Invisible Networking: Techniques and Defenses. Lei Wei, Michael K. Reiter, Ketan Mayer-Patel |
| 2010 | Traceability of Executable Codes Using Neural Networks. Davidson R. Boccardo, Tiago M. Nascimento, Raphael C. S. Machado, Charles B. Prado, Luiz F. R. C. Carmo |
| 2010 | Video Streaming Forensic - Content Identification with Traffic Snooping. Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee |
| 2010 | Walk the Walk: Attacking Gait Biometrics by Imitation. Bendik B. Mjaaland, Patrick Bours, Danilo Gligoroski |