| 2008 | A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation Systems. Jie Zhang, Murat Sensoy, Robin Cohen |
| 2008 | A Multiple-Control Fuzzy Vault. Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles |
| 2008 | A Protocol for Building Secure and Reliable Covert Channel. Baishakhi Ray, Shivakant Mishra |
| 2008 | An Access Control Scheme for Protecting Personal Data. Wilfred Villegas, Bader Ali, Muthucumaru Maheswaran |
| 2008 | An Effective Defense against Intrusive Web Advertising. Viktor Krammer |
| 2008 | An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes. Nathan Lewis, Noria Foukia |
| 2008 | AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System. Apurva Mohan, Douglas M. Blough |
| 2008 | CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment. Sheikh Iqbal Ahamed, Mehrab Monjur, Mohammad Saiful Islam |
| 2008 | Confidence-Compensating Privacy Protection. Piotr Cofta |
| 2008 | Cross-Language Weaving Approach Targeting Software Security Hardening. Azzam Mourad, Dima Alhadidi, Mourad Debbabi |
| 2008 | Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan |
| 2008 | Encoding the Program Correctness Proofs as Programs in PCC Technology. Heidar Pirzadeh, Danny Dubé |
| 2008 | IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter? Princely Ifinedo |
| 2008 | Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks. Ed Brown, Tracy Ann Kosa |
| 2008 | Investigating Two Different Approaches for Encrypted Traffic Classification. Riyad Alshammari, Nur Zincir-Heywood |
| 2008 | LogView: Visualizing Event Log Clusters. Adetokunbo Makanju, Stephen Brooks, Nur Zincir-Heywood, Evangelos E. Milios |
| 2008 | Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? Hilmi Günes Kayacik, Nur Zincir-Heywood |
| 2008 | Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi |
| 2008 | OpenHouse: A Secure Platform for Distributed Home Services. Jani Suomalainen, Seamus Moloney, Juha Koivisto, Kari Keinänen |
| 2008 | Private and Cheating-Free Outsourcing of Algebraic Computations. David Benjamin, Mikhail J. Atallah |
| 2008 | Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada Larry Korba, Stephen Marsh, Reihaneh Safavi-Naini |
| 2008 | The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems. Farag Azzedin, Ahmad Ridha |
| 2008 | The Uncertainty of the Truth. Michel Deriaz |
| 2008 | Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie |
| 2008 | Unlinkable Communication. Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel |
| 2008 | Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao |