| 2010 | A model-driven penetration test framework for Web applications. Pulei Xiong, Liam Peyton |
| 2010 | A new perspective of privacy protection: Unique distinct l-SR diversity. Yunli Wang, Yan Cui, Liqiang Geng, Hongyu Liu |
| 2010 | Achieving critical infrastructure protection through the interaction of computer security and network forensics. Ray Hunt, Jill Slay |
| 2010 | Analysis of Privacy Impact Assessments within Major jurisdictions. David Tancock, Siani Pearson, Andrew Charlesworth |
| 2010 | Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks. Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Aziz Bouras |
| 2010 | Co-located Physical-Layer Network Coding to mitigate passive eavesdropping. Michael Hay, Basil Saeed, Chung-Horng Lung, Anand Srinivasan |
| 2010 | Design of distributed security architecture for multihop WiMAX networks. Perumalraja Rengaraju, Chung-Horng Lung, Anand Srinivasan |
| 2010 | Detection, correlation, and visualization of attacks against critical infrastructure systems. Linda Briesemeister, Steven Cheung, Ulf Lindqvist, Alfonso Valdes |
| 2010 | Efficient privacy preserving reputation protocols inspired by secure sum. Omar Hasan, Elisa Bertino, Lionel Brunie |
| 2010 | Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada |
| 2010 | Guessing click-based graphical passwords by eye tracking. Daniel Leblanc, Alain Forget, Robert Biddle |
| 2010 | J3: High payload histogram neutral JPEG steganography. Mahendra Kumar, Richard E. Newman |
| 2010 | Keystroke dynamics: Characteristics and opportunities. Heather Crawford |
| 2010 | Lightweight protection against brute force login attacks on Web applications. Carlisle Adams, Guy-Vincent Jourdan, Jean-Pierre Levac, François Prevost |
| 2010 | Method ontology for intelligent network forensics analysis. Sherif Saad, Issa Traoré |
| 2010 | New approach for the dynamic enforcement of Web services security. Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok |
| 2010 | On achieving a digital identity management system with support for non-transferability. Brent Carrara, Carlisle Adams |
| 2010 | On the analysis of the Zeus botnet crimeware toolkit. Hamad Binsalleeh, Thomas C. Ormerod, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi, Lingyu Wang |
| 2010 | On the representation and verification of cryptographic protocols in a theory of action. James P. Delgrande, Aaron Hunter, Torsten Grote |
| 2010 | Ray - a secure micro kernel architecture. Stefan Nürnberger, Thomas Feller, Sorin A. Huss |
| 2010 | Risk analysis in access control systems. Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo |
| 2010 | Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications. Bon K. Sy, Adam Ramirez, Arun Prakash Kumara Krishnan |
| 2010 | Secure architecture for RFID enabled supply chain hierarchy. Nauman Abdullah Shah, Muhammad Arif Wahla |
| 2010 | Security advances and challenges in 4G wireless networks. Nabil Seddigh, Biswajit Nandy, Rupinder Makkar, Jean-Francois Beaumont |
| 2010 | Security of Error Correcting Code for biometric Encryption. Alex Stoianov |
| 2010 | Social networks for health care: Addressing regulatory gaps with privacy-by-design. James B. Williams, Jens H. Weber-Jahnke |
| 2010 | The relationship of trust, demand, and utility: Be more trustworthy, then i will buy more. Amirali Salehi-Abari, Tony White |
| 2010 | Towards a privacy preserving policy based infrastructure for social data access to enable scientific research. Palanivel Andiappan Kodeswaran, Evelyne Viegas |
| 2010 | Transaction signing in applications using identity federation. Paul Rabinovich |
| 2010 | Trust-aware monitoring scheme for WiMAX networks. Haïdar Safa, Farah Abu Shahla |
| 2010 | Vampire bats: Trust in Privacy. Tracy Ann Kosa |
| 2010 | You are the key: Generating cryptographic keys from voice biometrics. Brent Carrara, Carlisle Adams |