| 2011 | A Formal Approach to Distance-Bounding RFID Protocols. Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete |
| 2011 | A Privacy-Preserving Join on Outsourced Database. Sha Ma, Bo Yang, Kangshun Li, Feng Xia |
| 2011 | APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks. Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer |
| 2011 | Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption. Keita Emura, Atsuko Miyaji, Kazumasa Omote |
| 2011 | An Efficient Construction of Time-Selective Convertible Undeniable Signatures. Qiong Huang, Duncan S. Wong, Willy Susilo, Bo Yang |
| 2011 | Assessing Location Privacy in Mobile Communication Networks. Klaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle, Dirk von Suchodoletz |
| 2011 | Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders. Aggelos Kiayias, Serdar Pehlivanoglu |
| 2011 | Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes. Ge Zhang, Simone Fischer-Hübner |
| 2011 | Detection and Analysis of Cryptographic Data Inside Software. Ruoxu Zhao, Dawu Gu, Juanru Li, Ran Yu |
| 2011 | Efficient Fail-Stop Signatures from the Factoring Assumption. Atefeh Mashatan, Khaled Ouafi |
| 2011 | Hello rootKitty: A Lightweight Invariance-Enforcing Framework. Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen |
| 2011 | How Much Is Enough? Choosing ε for Differential Privacy. Jaewoo Lee, Chris Clifton |
| 2011 | How to Find Short RC4 Colliding Key Pairs. Jiageng Chen, Atsuko Miyaji |
| 2011 | Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings Xuejia Lai, Jianying Zhou, Hui Li |
| 2011 | MASHA - Low Cost Authentication with a New Stream Cipher. Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima |
| 2011 | Multi-stage Binary Code Obfuscation Using Improved Virtual Machine. Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang |
| 2011 | Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security. Yuan Zhou, Haifeng Qian, Xiangxue Li |
| 2011 | On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints. Joachim Biskup, Marcel Preuß, Lena Wiese |
| 2011 | Opacity Analysis in Trust Management Systems. Moritz Y. Becker, Masoud Koleini |
| 2011 | RatBot: Anti-enumeration Peer-to-Peer Botnets. Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz |
| 2011 | Replacement Attacks on Behavior Based Software Birthmark. Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie |
| 2011 | Round-Efficient Oblivious Database Manipulation. Sven Laur, Jan Willemson, Bingsheng Zhang |
| 2011 | Security Analysis of an RSA Key Generation Algorithm with a Large Private Key. Fanyu Kong, Jia Yu, Lei Wu |
| 2011 | SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms. Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos |
| 2011 | The n-Diffie-Hellman Problem and Its Applications. Liqun Chen, Yu Chen |
| 2011 | Toward Pairing-Free Certificateless Authenticated Key Exchanges. Hu Xiong, Qianhong Wu, Zhong Chen |