| 2011 | 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011 Pierangela Samarati, Sara Foresti, Jiankun Hu, Giovanni Livraga |
| 2011 | A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks. Tony Cheneau, Andrei Vlad Sambra, Maryline Laurent |
| 2011 | A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives. Martin Mihajlov, Saso Josimovski, Borka Jerman-Blazic |
| 2011 | A distributed client-puzzle mechanism to mitigate bandwidth attacks. Mazdak Alimadadi, Mehran S. Fallah |
| 2011 | A grid-based clustering for low-overhead anomaly intrusion detection. Yang Zhong, Hirofumi Yamaki, Hiroki Takakura |
| 2011 | A holistic methodology for evaluating wireless Intrusion Detection Systems. Khalid Nasr, Anas Abou El Kalam, Christian Fraboul |
| 2011 | A microcontroller SRAM-PUF. Christoph Böhm, Maximilian Hofer, Wolfgang Pribyl |
| 2011 | A misuse-based network Intrusion Detection System using Temporal Logic and stream processing. Abdulbasit Ahmed, Alexei Lisitsa, Clare Dixon |
| 2011 | A novel semi-supervised approach for network traffic clustering. Yu Wang, Yang Xiang, Jun Zhang, Shun-Zheng Yu |
| 2011 | A privacy-preserving eID based Single Sign-On solution. Bernd Zwattendorfer, Arne Tauber, Thomas Zefferer |
| 2011 | A propagation model of a vulnerability mitigation computer worm - seawave. Ziyad S. Al-Salloum, Stephen D. Wolthusen |
| 2011 | A secure, constraint-aware role-based access control interoperation framework. Nathalie Baracaldo, Amirreza Masoumzadeh, James Joshi |
| 2011 | An efficient VM-based software protection. Amir Averbuch, Michael Kiperberg, Nezer Zaidenberg |
| 2011 | Analysis of prefix hijacking based on AS hierarchical model. Bofeng Zhang, Yuan Li, Yujing Liu, Jinshu Su |
| 2011 | Attack-resilient compliance monitoring for large distributed infrastructure systems. Mirko Montanari, Roy H. Campbell |
| 2011 | Automated extraction of polymorphic virus signatures using abstract interpretation. Serge Chaumette, Olivier Ly, Renaud Tabary |
| 2011 | Automatic security verification for 3-party authentication and key exchange protocols. Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake |
| 2011 | Avoiding DDoS with active management of backlog queues. Martine Bellaïche, Jean-Charles Grégoire |
| 2011 | Channel state information based key generation vs. side-channel analysis key information leakage. Huiyun Li, Qi Zhang, Hai Yuan |
| 2011 | CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model. Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy |
| 2011 | DANAK: Finding the odd! Cynthia Wagner, Jérôme François, Radu State, Thomas Engel |
| 2011 | Data control in social networks. Robert Koch, Dominik Holzapfel, Gabi Dreo Rodosek |
| 2011 | Defeating pharming attacks at the client-side. Sophie Gastellier-Prevost, Maryline Laurent |
| 2011 | Designing secure RFID authentication protocols is (still) a non-trivial task. Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis |
| 2011 | Detecting infection onset with behavior-based policies. Kui Xu, Danfeng Yao, Qiang Ma, Alexander Crowell |
| 2011 | Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithm. Bassem Bakhache, Joseph M. Ghazal, Safwan El Assad |
| 2011 | Exploring twisted paths: Analyzing authorization processes in organizations. Steffen Bartsch |
| 2011 | FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems. Roberto Gallo, Henrique Kawakami, Ricardo Dahab |
| 2011 | Flooding attacks against network coding and countermeasures. Yuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, Marine Minier |
| 2011 | Foreword from the Conference Chairs. Sabrina De Capitani di Vimercati, Pierangela Samarati, Sara Foresti, Jiankun Hu |
| 2011 | Improving P2P IPTV random peers search through user similarity. Alessio Bonti, Ming Li, Wen Shi |
| 2011 | KL-F: Karhunen-Loève based fragile watermarking. Marco Botta, Davide Cavagnino, Victor Pomponiu |
| 2011 | Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication. Ravi Jhawar, Philip Inglesant, Nicolas T. Courtois, Martina Angela Sasse |
| 2011 | Measuring the revised guessability of graphical passwords. Rosanne English, Ron Poet |
| 2011 | Model-based safety analysis of SELinux security policies. Peter Amthor, Winfried E. Kühnhauser, Anja Pölck |
| 2011 | Modeling worms propagation on probability. Yini Wang, Sheng Wen, Yang Xiang |
| 2011 | Modelling self-protected networks and dynamic systems. Marta Fernández-Diego, Julián Marcelo-Cocho |
| 2011 | On the security of the ECKE-1N and EECKE-1N elliptic-curve key agreement protocols. Maurizio Adriano Strangio |
| 2011 | Privacy-enhanced identity via browser extensions and linking services. Renato Accornero, Daniele Rispoli, Francesco Bergadano |
| 2011 | R Nathan S. Evans, Christian Grothoff |
| 2011 | RCHB: Light-weight, provably-secure variants of the HB protocol using rotation and complementation. Samia A. Ali, Refaat M. Mohamed, Mahmoud H. Fahim |
| 2011 | Reactive non-interference for a browser model. Nataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens |
| 2011 | Reconstructing security types for automated policy enforcement in FABLE. Arash Afshar, Mehran S. Fallah |
| 2011 | Removing the blinders: Using information to mitigate adversaries in adaptive overlays. David Zage, Charles Killian, Cristina Nita-Rotaru |
| 2011 | SMS linguistic profiling authentication on mobile device. Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell |
| 2011 | STORK e-privacy and security. V. Koulolias, A. Kountzeris, Herbert Leitold, Bernd Zwattendorfer, A. Crespo, M. Stern |
| 2011 | Scalable consistency-based hardware trojan detection and diagnosis. Sheng Wei, Miodrag Potkonjak |
| 2011 | Secure conjunctive keyword searches for unstructured text. Florian Kerschbaum |
| 2011 | Semi-supervised learning for packed executable detection. Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas, Mikel Gastesi, José Miguel Esparza |
| 2011 | The power of credit card numbers and long CVVs. Valentim Oliveira, Tito Silva |
| 2011 | Towards a metric for recognition-based graphical password security. Rosanne English, Ron Poet |
| 2011 | Towards ground truthing observations in gray-box anomaly detection. Jiang Ming, Haibin Zhang, Debin Gao |
| 2011 | Towards improving security testability of AADL architecture models. Ayda Saïdane, Nicolas Guelfi |
| 2011 | Towards safe and optimal filtering rule reordering for complex packet filters. Nizar Ben Neji, Adel Bouhoula |
| 2011 | Tracking end-users in web databases. Boris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz, Erez Shmueli |
| 2011 | Trustable outsourcing of business processes to cloud computing environments. Sami Alsouri, Stefan Katzenbeisser, Sebastian Biedermann |
| 2011 | Usability of Internet Security Software: Have they got it right? Patryk Szewczyk |
| 2011 | User-representative feature selection for keystroke dynamics. Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed |