| 2011 | A Forward Private Protocol based on PRNG and LPN for Low-cost RFID . Xiaolin Cao, Máire O'Neill |
| 2011 | A Four-concern-oriented Secure IS Development Approach. Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Pierre Konopacki, Régine Laleau, Jérémy Milhau, Richard St-Denis |
| 2011 | A Framework for Security and Workload Gradual Adaptation. Antonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante |
| 2011 | A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap Channel. Yanling Chen, A. J. Han Vinck |
| 2011 | A Logical View of Nonmonotonicity in Access Control. Ali Noorollahi Ravari, Mehran S. Fallah |
| 2011 | A Method for Flexible Reduction over Binary Fields using a Field Multiplier. Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan, S. K. Nandy |
| 2011 | A New Steganographic Scheme based on First Order Reed Muller Codes - A New Steganographic Scheme. Houda Jouhari, El Mamoun Souidi |
| 2011 | A New Tree-structure-specified Multisignature Scheme for a Document Circulation System. Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka |
| 2011 | A Public Randomness Service. Michael J. Fischer, Michaela Iorga, René Peralta |
| 2011 | A Security Metrics Framework for the Cloud. Jesus Luna Garcia, Hamza Ghani, Daniel Germanus, Neeraj Suri |
| 2011 | A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks. Jing Xu, Wen Tao Zhu, Dengguo Feng |
| 2011 | A Smart-gentry based Software System for Secret Program Execution. Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith |
| 2011 | A Snort-based Mobile Agent for a Distributed Intrusion Detection System. Imen Brahmi, Sadok Ben Yahia, Pascal Poncelet |
| 2011 | A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs. Xin Xie, Fenlin Liu, Bin Lu, Tao Zhao, Hanning Li |
| 2011 | A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture. Zongbin Liu, Luning Xia, Jiwu Jing, Peng Liu |
| 2011 | Analysis of Botnets through Life-cycle. Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro |
| 2011 | Anomaly-based Spam Filtering. Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz, Pablo García Bringas |
| 2011 | Apollon: Towards a Semantically Extensible Policy Framework. Julian Schütte |
| 2011 | Artificial Immunity-based Correlation System. Guillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana, Arturo Ribagorda |
| 2011 | Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis. Maria-Camilla Fiazza, Michele Peroli, Luca Viganò |
| 2011 | Biometrics Privacy - Technologies and Applications. Vincenzo Piuri, Fabio Scotti |
| 2011 | Black-box Collision Attacks on the Compression Function of the GOST Hash Function. Nicolas T. Courtois, Theodosis Mourouzis |
| 2011 | Botnet Detection based on DNS Records and Active Probing. Iria Prieto, Eduardo Magaña, Daniel Morató, Mikel Izal |
| 2011 | Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. Kazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer |
| 2011 | Byzantine Decisions for Inferring Trust in Sensor Networks. Björn Stelte |
| 2011 | CCA Secure Certificateless Encryption Schemes based on RSA. S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan |
| 2011 | Chaotic Iterations for Steganography - Stego-security and Chaos-security. Nicolas Friot, Christophe Guyeux, Jacques M. Bahi |
| 2011 | Collective Classification for Unknown Malware Detection. Igor Santos, Carlos Laorden, Pablo García Bringas |
| 2011 | Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids. Mohammad Reza Sohizadeh Abyaneh |
| 2011 | Data and Access Management using Access Tokens for Delegating Authority to Persons and Software. Hidehito Gomi |
| 2011 | Differential Fault Analysis of Hummingbird. Yaser Esmaeili Salehani, Amr M. Youssef |
| 2011 | Distributed Threshold Cryptography Certification with No Trusted Dealer. Apostolos P. Fournaris |
| 2011 | Driver Authentication using Brain Waves While Route Tracing as a Mental Task. Isao Nakanishi, Sadanao Baba, Masahiro Inoue |
| 2011 | E-Commerce and Fair Exchange - The Problem of Item Validation. Fabio Piva, Ricardo Dahab |
| 2011 | Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB. Chunfang Yang, Tao Zhao, Hanning Li, Fenlin Liu |
| 2011 | Face Biometrics without Intrusion in Airport. Enrique Cabello |
| 2011 | Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream Cipher. Praloy Kr. Biswas, Dipanwita Roy Chowdhury, Kankar S. Dasgupta |
| 2011 | Higher Layer Authentication for Broadcast in Controller Area Networks. Bogdan Groza, Pal-Stefan Murvay |
| 2011 | How to Transmit Messages via WSN in a Hostile Environment. Marek Klonowski, Michal Koza, Miroslaw Kutylowski |
| 2011 | IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS. Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis |
| 2011 | Information-leakage in Hybrid Randomized Protocols. Stefan Rass, Peter Schartner |
| 2011 | Internationally Standardized Efficient Cryptographic Hash Function. Danilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen, Rune Erlend Jensen |
| 2011 | No Security by Obscurity - Why Two Factor Authentication Should Be based on an Open Design. Jinying Yu, Philipp Brune |
| 2011 | OPBUS: Risk-aware Framework for the Conformance of Security-quality Requirements in Business Processes. Angel Jesus Varela-Vaca, Rafael M. Gasca, Sergio Pozo |
| 2011 | On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting. Marina Blanton, Mehrdad Aliasgari |
| 2011 | On the Privacy Threats of Electronic Poll Books. Stefan Popoveniuc, John Kelsey, Eugen Leontie |
| 2011 | On the Security of Location Determination and Verification Methods for Wireless Networks. Günther Lackner |
| 2011 | On the Strength of Egglue and Other Logic CAPTCHAs. Carlos Javier Hernández-Castro, Arturo Ribagorda, Julio César Hernández Castro |
| 2011 | Paradigms of Distributed Software Systems - Services, Processes, and Self-organization. Winfried Lamersdorf |
| 2011 | Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing. Wassim Itani, Ayman I. Kayssi, Ali Chehab |
| 2011 | Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use. Jan Hajny, Lukas Malina, Vaclav Zeman |
| 2011 | Privacy-enhancing Cryptography-based Materials. Almudena Alcaide, Esther Palomar, Israel Barroso-Perez, Ali E. Abdallah |
| 2011 | Privacy-preserving Smart Metering without a Trusted-third-party. Tobias Jeske |
| 2011 | Private Searching for Sensitive File Signatures. John Solis |
| 2011 | Related-key Attack against Triple Encryption based on Fixed Points. Serge Vaudenay |
| 2011 | SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Javier López, Pierangela Samarati |
| 2011 | SYNEMA: Visual Monitoring of Network and System Security Sensors. Aline Bousquet, Patrice Clemente, Jean-François Lalande |
| 2011 | Semantic Annotations for Security Policy Matching in WS-policy. Giuseppe Di Modica, Orazio Tomarchio |
| 2011 | Smartphone Security Evaluation - The Malware Attack Case . Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis |
| 2011 | Study of the Phenomenology of DDOS Network Attacks in Phase Space. Michael E. Farmer, William Arthur |
| 2011 | The Image Protector - A Flexible Security Rule Specification Toolkit . Bechara al Bouna, Richard Chbeir, Alban Gabillon |
| 2011 | Three-party Password-authenticated Key Exchange without Random Oracles. Xun Yi, Raylin Tso, Eiji Okamoto |
| 2011 | Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree. Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai |
| 2011 | Towards a Calculus for Non Repudiation Protocols. Abdesselam Redouane |
| 2011 | Towards an Authorization System for Cloud Infrastructure Providers. Jorge Bernal Bernabé, Juan Manuel Marín Pérez, José M. Alcaraz Calero, Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta |
| 2011 | Towards an Information Control Policy Model - Achieving More Transparency in Internet Filtering Approaches. Andreas Kasten |
| 2011 | Unobservable Intrusion Detection based on Call Traces in Paravirtualized Systems. Carlo Maiero, Marino Miculan |
| 2011 | WiMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks. Han-Chieh Chao |