| 2010 | "My Smartphone is a Safe!" - The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones. Tim Dörflinger, Anna Voth, Juliane Krämer, Ronald Fromm |
| 2010 | A C++ Class for Analysing Vector Boolean Functions from a Cryptographic Perspective. José Antonio Álvarez-Cubero, Pedro J. Zufiria |
| 2010 | A New Chaos-based Watermarking Algorithm. Christophe Guyeux, Jacques M. Bahi |
| 2010 | A Novel Intrusion Detection System for MANETs. Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis |
| 2010 | Access Control Models for Business Processes. Vahid R. Karimi, Donald D. Cowan |
| 2010 | Adaptive and Composable Non-interactive String-commitment Protocols. Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai |
| 2010 | An Effective Clustering Approach to Web Query Log Anonymization. Amin Milani Fard, Ke Wang |
| 2010 | An Encryption Scheme for a Secure Policy Updating. Luan Ibraimi, Muhammad Asim, Milan Petkovic |
| 2010 | An ICT Security Management Framework. Aristeidis Chatzipoulidis, Ioannis Mavridis |
| 2010 | An Identity based Ring Signcryption Scheme with Public Verifiability. S. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan |
| 2010 | Analysis of SNOW 3G⊕ Resynchronization Mechanism. Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang |
| 2010 | Anonymous Services - Enhancing End-user Privacy Exploiting Anonymous Networks. Giovanni Cabiddu, Emanuele Cesena, Davide Vernizzi |
| 2010 | Anonymous Social Stamps - Authenticating Anonymous Statements to Friends with Privacy. Sandeep S. Kumar |
| 2010 | Anonymous Subscription Schemes - A Flexible Construction for On-line Services Access. María Isabel González Vasco, Somayeh Heidarvand, Jorge L. Villar |
| 2010 | Anonymous but Authorized Transactions Supporting Selective Traceability. Daniel Slamanig, Stefan Rass |
| 2010 | Attacks on Web Services and Mitigation Schemes. Vipul Patel, Radhesh Mohandas, Alwyn R. Pais |
| 2010 | Auditing the Defense Against Cross Site Scripting in Web Applications. Lwin Khin Shar, Hee Beng Kuan Tan |
| 2010 | Automated Threat Identification for UML. George Yee, Xingli Xie, Shikharesh Majumdar |
| 2010 | BMQE System - A MQ Equations System based on Ergodic Matrix. Xiaoyi Zhou, Jixin Ma, Wencai Du, Bo Zhao, Miltos Petridis, Yongzhe Zhao |
| 2010 | Chaotic Quantum Cryptography - The Ultimate for Network Security. Stamatios V. Kartalopoulos |
| 2010 | Confidentiality and Integrity for SUM Aggregation in Sensor Networks. Keith B. Frikken, Yihua Zhang |
| 2010 | Conjugation as Public Key Agreement Protocol in Mobile Cryptography. Vittorio Ottaviani, Alberto Zanoni, Massimo Regoli |
| 2010 | Don't Follow Me - Spam Detection in Twitter. Alex Hai Wang |
| 2010 | Efficient Algorithmic Safety Analysis of HRU Security Models. Anja Fischer, Winfried E. Kühnhauser |
| 2010 | Efficient Asymmetric IPSec for Secure iSCSI. Murthy S. Andukuri, C. Edward Chow |
| 2010 | EnCoRe: Towards a Holistic Approach to Privacy. Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson |
| 2010 | Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures. Meng Yu, Alex Hai Wang, Wanyu Zang, Peng Liu |
| 2010 | Extended Visual Cryptography Scheme for Color Images with no Pixel Expansion. Xiaoyu Wu, Duncan S. Wong, Qing Li |
| 2010 | Forcing Out a Confession - Threshold Discernible Ring Signatures. Swarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan |
| 2010 | Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2. Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica |
| 2010 | From Nature to Methods and Back to Nature. Petar M. Djuric |
| 2010 | Graphical Authentication based on user Behaviour. Ahmed Al-Khazzar, Nick Savage |
| 2010 | HTEE: An HMAC based Tamper Evident Encryption. Bradley Baker, C. Edward Chow |
| 2010 | HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR Index. Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik |
| 2010 | Handling IDS' Reliability in Alert Correlation - A Bayesian Network-based Model for Handling IDS's Reliability and Controlling Prediction/False Alarm Rate Tradeoffs. Karim Tabia, Philippe Leray |
| 2010 | Implications of Misbehaving Attacks on Probabilistic Quorum System for MANETs. Elisa Mannes, Eduardo da Silva, Michele Nogueira Lima, Aldri Luiz dos Santos |
| 2010 | Improving N-Gram Linguistic Steganography based on Templates. Alfonso Muñoz Muñoz, Justo Carracedo Gallardo, Irina Arguelles Álvarez |
| 2010 | Infinite Alphabet Passwords - A Unified Model for a Class of Authentication Systems. Marcia Gibson, Marc Conrad, Carsten Maple |
| 2010 | Information Security: The SCAN - Secure Processor with Crypto-Biometrics Capabilities. Nikolaos G. Bourbakis |
| 2010 | Management of Security Policies in Virtual Organisations. Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec, Philip Robinson |
| 2010 | Nanonetworks - A New Frontier in Communications. Ian F. Akyildiz |
| 2010 | New Pseudo Near Collision Attack on Tiger. Dibyendu Mallik, Debdeep Mukhopadhyay |
| 2010 | On a Construction of Stream-cipher-based Hash Functions. Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka |
| 2010 | On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols. David M. Williams, Helen Treharne, Anthony T. S. Ho |
| 2010 | Piecewise Classification of Attack Patterns for Efficient Network Intrusion Detection. Abdelhalim Zaidi, Nazim Agoulmine, Tayeb Kenaza |
| 2010 | Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals. Oliver Gmelch, Günther Pernul |
| 2010 | Privacy Protection for user Authentication. Jan Hajny, Tomas Pelka, Vaclav Zeman |
| 2010 | Providing Confidentiality in Content-based Publish/subscribe Systems. Mihaela Ion, Giovanni Russello, Bruno Crispo |
| 2010 | Proxiable Designated Verifier Signature. Mebae Ushida, Kazuo Ohta, Yutaka Kawai, Kazuki Yoneyama |
| 2010 | QoS and Security in Energy-harvesting Wireless Sensor Networks. Antonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante |
| 2010 | Realizing Secure Multiparty Computation on Incomplete Networks. Shailesh Vaya |
| 2010 | Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach. Mahjoub Langar, Mohamed Mejri, Kamel Adi |
| 2010 | Risk based Access Control with Uncertain and Time-dependent Sensitivity. John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget |
| 2010 | SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Sokratis K. Katsikas, Pierangela Samarati |
| 2010 | Safe RPC - Auditing Mixnets Safely using Randomized Partial Checking. Stefan Popoveniuc, Eugen Leontie |
| 2010 | Secure Bridging in Large Scale Deployment of Ethernet. Khan Ferdous Wahid, Javier Rubio-Loyola |
| 2010 | Security Models for Heterogeneous Networking. Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, Raphael Chung-Wei Phan |
| 2010 | Security in Future Mobile Sensor Networks - Issues and Challenges. Eliana Stavrou, Andreas Pitsillides, George C. Hadjichristofi, Christoforos N. Hadjicostis |
| 2010 | Server-assisted Long-term Secure 3-party Key Establishment. Kashi Neupane, Rainer Steinwandt |
| 2010 | Short ECC - A Lightweight Security Approach for Wireless Sensor Networks. Anna Sojka, Krzysztof Piotrowski, Peter Langendörfer |
| 2010 | Side-channel Attack on the HumanAuth CAPTCHA. Carlos Javier Hernández-Castro, Arturo Ribagorda, Yago Sáez |
| 2010 | Techniques for Validation and Controlled Execution of Processes, Codes and Data - A Survey. Dipankar Dasgupta, Sudip Saha, Aregahegn Negatu |
| 2010 | The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies. Jonny Milliken, Alan Marshall |
| 2010 | Throttling DDoS Attacks using Discrete Logarithm Problem. Avinash Darapureddi, Radhesh Mohandas, Alwyn Roshan Pais |
| 2010 | Towards Data Protection Compliance. Nicola Zannone, Milan Petkovic, Sandro Etalle |
| 2010 | Towards Risk based Prevention of Grooming Attacks. Dimitrios Michalopoulos, Ioannis Mavridis |
| 2010 | Trust Degree based Access Control for Social Networks. Bo Lang |
| 2010 | Ultra High Speed SHA-256 Hashing Cryptographic Module for IPSec Hardware/Software Codesign. Harris E. Michail, George Athanasiou, Angeliki Kritikakou, Costas E. Goutis, Andreas Gregoriades, Vicky G. Papadopoulou |
| 2010 | Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai |
| 2010 | Vulnerability of a Non-membership Proof Scheme. Kun Peng, Feng Bao |
| 2010 | What can RFID do for Vanets? - A Cryptographic Point of View. Jorge Munilla, Andrés Ortiz, Alberto Peinado |