| 2008 | A 640 Mbit/S 32-Bit Pipelined Implementation of the AES Algorithm. Guido Marco Bertoni, Luca Breveglieri, Roberto Farina, Francesco Regazzoni |
| 2008 | A Fair e-Tendering Protocol. Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang |
| 2008 | A Fast Encryption Scheme for Networks Applications. Mohamed Abo El-Fotouh, Klaus Diepold |
| 2008 | A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers. Guanhan Chew, Khoongming Khoo |
| 2008 | A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets. Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca |
| 2008 | A Multiple Birthday Attack on NTRU. Raphael Overbeck |
| 2008 | A New Probabilistic Rekeying Method for Secure Dynamic Groups. Shankar Joshi, Alwyn R. Pais |
| 2008 | A Note on Biometrics-based Authentication with Portable Device. Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano, Kensuke Baba, Hiroto Yasuura |
| 2008 | A Polynomial based Hashing Algorithm. V. Kumar Murty, Nikolajs Volkovs |
| 2008 | A Review of Trust Management, Security and Privacy Policy Languages. Juri Luca De Coi, Daniel Olmedilla |
| 2008 | A Short Note on Secret Sharing using Elliptic Curves. Volker Müller |
| 2008 | Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge. Salem Benferhat, Karima Sedki |
| 2008 | An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks. Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sánchez-Aarnoutse, Joan García-Haro |
| 2008 | An Efficient Multiplication Algorithm using Binomial Residue Representation. Yin Li, Christophe Nègre |
| 2008 | An Efficient Reconfigurable SOS Montgomery Multiplier in GF (P) usign FPGA DSP Slices. Muhammed Nauman Qureshi, Muhammad Nadeem Sial, Nassar Ikram |
| 2008 | An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity. Satyajit Grover, Divya Naidu Kolar Sunder, Samuel O. Moffatt, Michael E. Kounavis |
| 2008 | An Improvement of Strong Proxy Signature and Its Applications. Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou |
| 2008 | An e-Voting Protocol based on Pairing Blind Signatures. Lourdes López-García, Francisco Rodríguez-Henríquez, Miguel Ángel León-Chávez |
| 2008 | Anonymous Message Authentication - Universally Composable Definition and Construction. Kazuki Yoneyama |
| 2008 | Application to a Shared Terminal of a Roaming User Profile Set Up through LDAP-Smart Card Authentication Cooperation. Kazuto Kuzuu, Yasushi Hirano, Kenji Mase, Toyohide Watanabe |
| 2008 | Applying SRP on SIP Authentication. Celalettin Kilinc, Ali Gökhan Yavuz |
| 2008 | Autonomic Trust Management for a Pervasive System. Zheng Yan |
| 2008 | CSteg: Talking in C Code - Steganography of C Source Code in Text. Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho |
| 2008 | Cryptographic Algorithms - Successes, Failures and Challenges. Bart Preneel |
| 2008 | Cryptonet: Secure E-Mail System. Sead Muftic, Gernot Schmoelzer |
| 2008 | Detection of Illicit Traffic using Neural Networks. Paulo Salvador, António Nogueira, Ulisses França, Rui Valadas |
| 2008 | Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics. Christian Damsgaard Jensen, Thomas Rune Korsgaard |
| 2008 | Efficient IBE-PKE Proxy Re-Encryption. Takeo Mizuno, Hiroshi Doi |
| 2008 | Efficient Localization Schemes in Sensor Networks with Malicious Nodes. Kaiqi Xiong, David J. Thuente |
| 2008 | Enhanced Secure Interface for a Portable e-Voting Terminal. André Zúquete |
| 2008 | Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems. Kikelomo Maria Apampa, Tian Zhang, Gary B. Wills, David Argles |
| 2008 | Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy. Hanane Houmani, Mohamed Mejri |
| 2008 | Experimental Research and Capability Valuation on Security of SOA-SCA based SDO. Peng Xu, Zhiyi Fang, Hang Su, Chuyi Wei |
| 2008 | FPGA-Targeted Hardware Implementations of K2. Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai |
| 2008 | Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. Ioanna Dionysiou, David E. Bakken, Carl H. Hauser, Deborah A. Frincke |
| 2008 | Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers. B. B. Amberker, N. R. Sunitha |
| 2008 | Functionality-based Application Confinement - Parameterised Hierarchical Application Restrictions. Z. Cliffe Schreuders, Christian Payne |
| 2008 | Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity Steganography. Malte Diehl |
| 2008 | Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon. Ammar Boulaiche, Kamel Adi |
| 2008 | Identity-based Signcryption without Random Oracles. Shivaramakrishnan Narayan, Parampalli Udaya, Peter Hyun-Jeen Lee |
| 2008 | Improved Fuzzy Vault Scheme for Fingerprint Verification. Cengiz Örencik, Thomas Brochmann Pedersen, Erkay Savas, Mehmet Keskinöz |
| 2008 | Improving Reliability in Commercial IP Networks. Yaakov Kogan |
| 2008 | Interactivity for Reactive Access Control. Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia |
| 2008 | Intrusion Detection and Prevention System using Secure Mobile Agents. Muhammad Awais Shibli, Sead Muftic |
| 2008 | Kerberos Implementation in Manets. Atta-ur-Rahman, Mureed Hussain, Kahina Kabri, Dominique Seret |
| 2008 | Key Distribution based on Quantum Fourier Transform. Marius Nagy, Selim G. Akl, Sean Kershaw |
| 2008 | Key Management of Quantum Generated Keys in IPsec. Andreas Neppach, Christian Pfaffel-Janser, Ilse Wimberger, Thomas Lorünser, Michael Meyenburg, Alexander Szekely, Johannes Wolkerstorfer |
| 2008 | Low Area Scalable Montgomery Inversion Over GF(2m). Mohamed N. Hassan, Mohammed Benaissa |
| 2008 | Metrics Application in Metropolitan Broadband Access Network Security Analysis. Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Mario Lemes Proença Jr. |
| 2008 | Multi-Collisions Attack in Ring Hash Structure. Nasour Bagheri, Babak Sadeghiyan, Majid Naderi |
| 2008 | Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks. Omer Zekvan Yilmaz, Albert Levi, Erkay Savas |
| 2008 | New Schemes for Anomaly Score Aggregation and Thresholding. Salem Benferhat, Karim Tabia |
| 2008 | New Techniques to Enhance the Capabilities of the Socks Network Security Protocol. Mukund Sundararajan, Mohammad S. Obaidat |
| 2008 | Next Generation CDMA Technologies for Futuristic Wireless Communications. Hsiao-Hwa Chen |
| 2008 | Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold. Tarik Guelzim, Mohammad S. Obaidat |
| 2008 | Novel and Anomalous Behavior Detection using Bayesian Network Classifiers. Salem Benferhat, Karim Tabia |
| 2008 | On the (In)Security of Two Buyer-Seller Watermarking Protocols. Geong Sen Poh, Keith M. Martin |
| 2008 | Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3. Kwang Ho Kim, Christophe Nègre |
| 2008 | Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas. Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini |
| 2008 | Price to Provide RFID Security and Privacy?. Tim Good, Mohammed Benaissa |
| 2008 | Proper Key Generation for the IzoSign Algorithm. Loránd Szöllösi, Gábor Fehér, Tamás Marosits |
| 2008 | Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets. Eduardo da Silva, Aldri Luiz dos Santos, Luiz Carlos Pessoa Albini, Michele Nogueira Lima |
| 2008 | REBEL - Reconfigurable Block Encryption Logic. Mahadevan Gomathisankaran, Ka-Ming Keung, Akhilesh Tyagi |
| 2008 | Reputation Management in Grid-based Virtual Organisations. Álvaro Enrique Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi |
| 2008 | Rethinking Digital Signatures. Ueli M. Maurer |
| 2008 | SAKE - Secure Authenticated Key Establishment in Sensor Networks. Muhammad Yasir, Mureed Hussain, Kahina Kabri, Dominique Seret |
| 2008 | SCFS: Towards Design and Implementation of a Secure Distributed Filesystem. Juan Vera del Campo, Juan Hernández-Serrano, Josep Pegueroles |
| 2008 | SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Eduardo Fernández-Medina, Manu Malek, Javier Hernando |
| 2008 | Sec-SNMP: Policy-based Security Management for Sensor Networks. Qinghua Wang, Tingting Zhang |
| 2008 | Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption. Peter Hyun-Jeen Lee, Shivaramakrishnan Narayan, Parampalli Udaya |
| 2008 | Securing the Email Services - New System for Secure Managing the Organization's Mail Service. Raúl Herbosa, Gabriel Díaz, Manuel Castro |
| 2008 | Security Policy Instantiation to React to Network Attacks - An Ontology-based Approach using OWL and SWRL. Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra |
| 2008 | Security Requirements in Software Product Lines. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini |
| 2008 | Security and Authentication for Networked Storage. V. Kumar Murty, Guangwu Xu |
| 2008 | Selecting Trustworthy Content using Tags. Daniele Quercia, Licia Capra, Valentina Zanardi |
| 2008 | The Importance of Metrology in Wireless Communication Systems - From AM/FM to SDR Systems. Nuno Borges Carvalho |
| 2008 | The Substitution Cipher Chaining Mode. Mohamed Abo El-Fotouh, Klaus Diepold |
| 2008 | Towards Language-Independent Approach for Security Concerns Weaving. Azzam Mourad, Dima Alhadidi, Mourad Debbabi |
| 2008 | Traitor Tracing for Anonymous Attack in Content Protection. Hongxia Jin |
| 2008 | Trust Model for High Quality Recommendation. Gabriele Lenzini, Nabil Sahli, Henk Eertink |
| 2008 | Watermarking, Steganography and Content Forensics. Ingemar J. Cox |
| 2008 | Yet Another Secure Distance-Bounding Protocol. Ventzislav Nikov, Marc Vauclair |
| 2008 | e-Business Innovation - Surviving the Coming Decades. David A. Marca |