| 2012 | 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks. Samiran Bag, Aritra Dhar, Pinaki Sarkar |
| 2012 | A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching. Ciprian-Petrisor Pungila, Viorel Negru |
| 2012 | A Quantitative Approach for Inexact Enforcement of Security Policies. Peter Drábik, Fabio Martinelli, Charles Morisset |
| 2012 | Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited. Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser |
| 2012 | An Empirical Study of Dangerous Behaviors in Firefox Extensions. Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, Zhiyong Feng |
| 2012 | Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems. Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari |
| 2012 | Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems. Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang |
| 2012 | Differential Attacks on Reduced RIPEMD-160. Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer |
| 2012 | Domain-Specific Pseudonymous Signatures for the German Identity Card. Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler |
| 2012 | Dynamic Anomaly Detection for More Trustworthy Outsourced Computation. Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini, Stefan Katzenbeisser |
| 2012 | Efficient Two-Move Blind Signatures in the Common Reference String Model. Essam Ghadafi, Nigel P. Smart |
| 2012 | GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library. Johannes Gilger, Johannes Barnickel, Ulrike Meyer |
| 2012 | Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings Dieter Gollmann, Felix C. Freiling |
| 2012 | Intended Actions: Risk Is Conflicting Incentives. Lisa Rajbhandari, Einar Snekkenes |
| 2012 | Learning Fine-Grained Structured Input for Memory Corruption Detection. Lei Zhao, Debin Gao, Lina Wang |
| 2012 | Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot |
| 2012 | OSDM: An Organizational Supervised Delegation Model for RBAC. Nezar Nassr, Nidal Aboudagga, Eric Steegmans |
| 2012 | On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree. Noboru Kunihiro |
| 2012 | On the Self-similarity Nature of the Revocation Data. Carlos Gañán, Jorge Mata-Díaz, Jose L. Muñoz, Oscar Esparza, Juanjo Alins |
| 2012 | Privacy-Preserving Speaker Authentication. Manas A. Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso |
| 2012 | Revisiting Difficulty Notions for Client Puzzles and DoS Resilience. Bogdan Groza, Bogdan Warinschi |
| 2012 | Secure Hierarchical Identity-Based Identification without Random Oracles. Atsushi Fujioka, Taiichi Saito, Keita Xagawa |
| 2012 | Selective Document Retrieval from Encrypted Database. Christoph Bösch, Qiang Tang, Pieter H. Hartel, Willem Jonker |
| 2012 | Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms. Falko Strenzke |
| 2012 | Strong Authentication with Mobile Phone. Sanna Suoranta, André Andrade, Tuomas Aura |