| 2011 | A Diffie-Hellman based privacy protocol for Car-to-X communication. Hagen Stübing, Murat Ceven, Sorin A. Huss |
| 2011 | A hamming distance-like filtering in keystroke dynamics. Yoshihiro Kaneko, Yuji Kinpara, Yuta Shiomi |
| 2011 | A probabilistic-based approach towards trust evaluation using Poisson Hidden Markov Models and Bonus Malus Systems. Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis |
| 2011 | A trust-based approach against IP-spoofing attacks. Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi |
| 2011 | Advantages of a non-technical XACML notation in role-based models. Bernard Stepien, Stan Matwin, Amy P. Felty |
| 2011 | An implementation of a verification condition generator for foundational proof-carrying code. Jiangong Weng, Amy P. Felty |
| 2011 | Beyond privacy policies - assessing inherent privacy risks of consumer health services. Jens H. Weber-Jahnke, James B. Williams |
| 2011 | Cryptographic security models for eHealth P2P database management systems network. Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto |
| 2011 | Data preprocessing for distance-based unsupervised Intrusion Detection. Dina Said, Lisa Stirling, Peter Federolf, Ken Barker |
| 2011 | Delegation of access rights in a privacy preserving access control model. Md. Moniruzzaman, Ken Barker |
| 2011 | Detecting P2P botnets through network behavior analysis and machine learning. Sherif Saad, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian |
| 2011 | Ensuring tight computational security against higher-order DPA attacks. Dakshita Khurana, Aditya Gaurav |
| 2011 | Extraction and comprehension of moodle's access control model: A case study. François Gauthier, Dominic Letarte, Thierry Lavoie, Ettore Merlo |
| 2011 | Forward secure identity-based key agreement for dynamic groups. Nick Mailloux, Ali Miri, Monica Nevins |
| 2011 | General Secure Function Evaluation using standard trusted computing hardware. Steve R. Tate, Roopa Vishwanathan |
| 2011 | I-RBAC: Isolation enabled role-based access control. Nagajyothi Gunti, Weiqing Sun, Mohammed Y. Niamat |
| 2011 | Improving security and usability of low cost RFID tags. Ali Nur Mohammad Noman, Sk. Md. Mizanur Rahman, Carlisle Adams |
| 2011 | Improving the use of advisor networks for multi-agent trust modelling. Joshua Gorner, Jie Zhang, Robin Cohen |
| 2011 | Model-based systems security quantification. Samir Ouchani, Yosr Jarraya, Otmane Aït Mohamed |
| 2011 | Modelling of security properties in Alloy. Lilia Georgieva |
| 2011 | Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada |
| 2011 | On Re-use of randomness in broadcast encryption. Paolo Gasti, Alessio Merlo |
| 2011 | On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY. Serguei A. Mokhov, Joey Paquet, Mourad Debbabi |
| 2011 | Online information privacy: Agent-mediated payoff. Abdulsalam Yassine, Ali A. Nazari Shirehjini, Shervin Shirmohammadi, Thomas T. Tran |
| 2011 | Performance analysis of QKD based key distribution for IEEE 802.11 networks. Shirantha Wijesekera, Xu Huang, Dharmendra Sharma |
| 2011 | Privacy Data Envelope: Concept and implementation. Mahmoud Ghorbel, Armen Aghasaryan, Stéphane Betgé-Brezetz, Marie-Pascale Dupont, Guy-Bertrand Kamga, Sophie Piekarec |
| 2011 | Privacy challenges of open APIs: Case location based services. Alberto Vila Tena, Yrjö Raivio |
| 2011 | Privacy-preserving matchmaking For mobile social networking secure against malicious users. Qi Xie, Urs Hengartner |
| 2011 | Pseudonymised communication in delay tolerant networks. Naveed Ahmad, Haitham S. Cruickshank, Zhili Sun, Muhammad Asif |
| 2011 | RC4 state and its applications. Qian Yu, Chang N. Zhang |
| 2011 | Risk-based decision method for access control systems. Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski |
| 2011 | Safe realization of the Generalization privacy mechanism. Tristan Allard, Benjamin Nguyen, Philippe Pucheral |
| 2011 | Secure communication with secret sharing in static computer networks with partition in mistrust parties. Johannes Viehmann |
| 2011 | The ultimate invasion of privacy: Identity theft. Esma Aïmeur, David Schönfeld |
| 2011 | Towards machine-assisted formal procedures for the collection of digital evidence. Martín Barrère, Gustavo Betarte, Marcelo Rodríguez |
| 2011 | Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognition. Abbas Javadtalab, Laith Abbadi, Mona Omidyeganeh, Shervin Shirmohammadi, Carlisle M. Adams, Abdulmotaleb El Saddik |
| 2011 | Trust bootstrapping services and service providers. Zainab M. Aljazzaf, Miriam A. M. Capretz, Mark Perry |
| 2011 | UPBA: User-Authenticated Property-Based Attestation. Mark Manulis, Marion Steiner |
| 2011 | Validation of security for participant control exchanges in multicast content distribution. Mohammad Parham, John William Atwood |