| 2012 | (Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack. Yunmei Zhang, Man Ho Au, Guomin Yang, Willy Susilo |
| 2012 | A Bird's Eye View on the I2P Anonymous File-Sharing Environment. Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor |
| 2012 | A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data. Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, Hassan Mahdikhani |
| 2012 | A Communication Efficient Group Key Distribution Scheme for MANETs. Yang Yang |
| 2012 | A Scalable Link Model for Local Optical Wireless Networks. Tae-Gyu Lee, Gi-Soo Chung |
| 2012 | A Secure and Private RFID Authentication Protocol under SLPN Problem. Mohammad Saiful Islam Mamun, Atsuko Miyaji, Mohammad Shahriar Rahman |
| 2012 | Addressing Situational Awareness in Critical Domains of a Smart Grid. Cristina Alcaraz, Javier López |
| 2012 | An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks. Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding |
| 2012 | Attestation of Mobile Baseband Stacks. Steffen Wagner, Sascha Wessel, Frederic Stumpf |
| 2012 | Background Transfer Method for Ubiquitous Computing. Tae-Gyu Lee, Gi-Soo Chung |
| 2012 | Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net. Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu |
| 2012 | Cryptanalysis of Exhaustive Search on Attacking RSA. Mu-En Wu, Raylin Tso, Hung-Min Sun |
| 2012 | Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture. Ding Wang, Chunguang Ma, De-li Gu, Zhen-shan Cui |
| 2012 | Detecting Spammers via Aggregated Historical Data Set. Eitan Menahem, Rami Puzis, Yuval Elovici |
| 2012 | Differential Privacy Data Release through Adding Noise on Average Value. Xilin Zhang, Yingjie Wu, Xiaodong Wang |
| 2012 | Direct CCA Secure Identity-Based Broadcast Encryption. Leyou Zhang, Qing Wu, Yupu Hu |
| 2012 | Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud. Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, Zheli Liu |
| 2012 | Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks. Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan |
| 2012 | Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection. Yuxin Meng, Lam-for Kwok |
| 2012 | Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymity. Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou |
| 2012 | FlexCOS: An Open Smartcard Platform for Research and Education. Kristian Beilke, Volker Roth |
| 2012 | Identifying OS Kernel Objects for Run-Time Security Analysis. Amani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy |
| 2012 | Impossible Differential Cryptanalysis on Tweaked E2. Yuechuan Wei, Xiaoyuan Yang, Chao Li, Weidong Du |
| 2012 | Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel Errors. Jing Guo, Zhuxiao Wang |
| 2012 | Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks. Huimin Shuai, Wen Tao Zhu |
| 2012 | Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC). Nima Mousavi, Mahesh V. Tripunitara |
| 2012 | Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings Li Xu, Elisa Bertino, Yi Mu |
| 2012 | On the Automated Analysis of Safety in Usage Control: A New Decidability Result. Silvio Ranise, Alessandro Armando |
| 2012 | On the Improvement of Fermat Factorization. Mu-En Wu, Raylin Tso, Hung-Min Sun |
| 2012 | Operating System Kernel Data Disambiguation to Support Security Analysis. Amani S. Ibrahim, John Grundy, James H. Hamlyn-Harris, Mohamed Almorsy |
| 2012 | Practical Certificateless Public Key Encryption in the Standard Model. Wenjie Yang, Futai Zhang, Limin Shen |
| 2012 | Private Friends on a Social Networking Site Operated by an Overly Curious SNP. Roman Schlegel, Duncan S. Wong |
| 2012 | Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. Lukasz Krzywiecki, Miroslaw Kutylowski |
| 2012 | Proxy Signature Scheme Based on Isomorphisms of Polynomials. Shaohua Tang, Lingling Xu |
| 2012 | Resilience Strategies for Networked Malware Detection and Remediation. Yue Yu, Michael Fry, Bernhard Plattner, Paul Smith, Alberto E. Schaeffer Filho |
| 2012 | Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. Shengli Liu, Fangguo Zhang, Kefei Chen |
| 2012 | Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks. Sushama Karumanchi, Anna Cinzia Squicciarini, Dan Lin |
| 2012 | The Performance of Public Key-Based Authentication Protocols. Kaiqi Xiong |
| 2012 | Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games. Willy Susilo, Yang-Wai Chow, Rungrat Wiangsripanawan |
| 2012 | Universal Designated Verifier Signcryption. Fei Tang, Changlu Lin, Pinhui Ke |