| 2012 | A Collaborative Firewall for Wireless Ad-Hoc Social Networks. Leonardo Maccari |
| 2012 | A Mission-centric Framework for Cyber Situational Awareness. Sushil Jajodia |
| 2012 | A Novel Fuzzy Vault Scheme for Secret Key Exchange. Lin You, Jie Lu |
| 2012 | A Perspective of the Networks of the Future and Smart Cities. Luís M. Correia |
| 2012 | A Proposed Framework for Analysing Security Ceremonies. Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio |
| 2012 | A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation. Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen |
| 2012 | ADQL: A Flexible Access Definition and Query Language to Define Access Control Models. Andreas C. Sonnenbichler, Andreas Geyer-Schulz |
| 2012 | Adaptive Speech Watermarking in Wavelet Domain based on Logarithm. Mehdi Fallahpour, David Megías, Hossein Najaf-Zadeh |
| 2012 | An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management. Julien Bringer, Hervé Chabanne, Alain Patey |
| 2012 | An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size. Chiara Valentina Schiavo, Andrea Visconti |
| 2012 | Analysis of Some Natural Variants of the PKP Algorithm. Rodolphe Lampe, Jacques Patarin |
| 2012 | Attack Modelling and Security Evaluation for Security Information and Event Management. Igor V. Kotenko, Andrey Chechulin, Evgenia Novikova |
| 2012 | Biometric Identification in Virtual Worlds using Biometric Fusion Techniques. Ahmed Al-Khazzar, Nick Savage |
| 2012 | Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection. Yuyu Chou, Jan Oetting, Olga Levina |
| 2012 | Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure. Keita Emura, Mohammad Shahriar Rahman |
| 2012 | Cryptographic Enforcement of Access Control while Mitigating Key Sharing. Keith B. Frikken |
| 2012 | Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale. Geoffrey Charles Fox |
| 2012 | DDoS Detection with Information Theory Metrics and Netflows - A Real Case. Domenico Vitali, Antonio Villani, Angelo Spognardi, Roberto Battistoni, Luigi V. Mancini |
| 2012 | Data Repository for Security Information and Event Management in Service Infrastructures. Igor V. Kotenko, Olga Polubelova, Igor Saenko |
| 2012 | Defense Against TCP Flooding Attack. Seungyong Yoon, Jintae Oh, Ikkyun Kim, Jongsoo Jang |
| 2012 | Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol. Martin Schütte, Thomas Scheffler, Bettina Schnor |
| 2012 | Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer. Apostolos P. Fournaris |
| 2012 | Extension of de Weger's Attack on RSA with Large Public Keys. Nicolas T. Courtois, Theodosis Mourouzis, Pho V. Le |
| 2012 | Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization. Keita Emura, Takashi Sato |
| 2012 | Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction. Henrich Christopher Pöhls, Kai Samelin, Hermann de Meer, Joachim Posegga |
| 2012 | Formal Analysis of the TLS Handshake Protocol. Hanane Houmani, Mourad Debbabi |
| 2012 | High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach. George Athanasiou, Chara I. Chalkou, D. Bardis, Harris E. Michail, George Theodoridis, Costas E. Goutis |
| 2012 | Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture. Benjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge |
| 2012 | HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots. Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas |
| 2012 | Identity-based Password-Authenticated Key Exchange for Client/Server Model. Xun Yi, Raylin Tso, Eiji Okamoto |
| 2012 | Improved "Partial Sums"-based Square Attack on AES. Michael Tunstall |
| 2012 | Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm. Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf |
| 2012 | Improving Cloud Survivability through Dependency based Virtual Machine Placement. Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, Xubin He |
| 2012 | Inverting Thanks to SAT Solving - An Application on Reduced-step MD*. Florian Legendre, Gilles Dequen, Michaël Krajecki |
| 2012 | Key Management as a Service. Liran Lerman, Olivier Markowitch, Jorge Nakahara Jr. |
| 2012 | Making Sense of All Things Handwritten - From Postal Addresses to Tablet Notes. Venu Govindaraju |
| 2012 | Network-based Executable File Extraction and Analysis for Malware Detection. Byoung-Koo Kim, Ikkyun Kim, Tai-Myoung Chung |
| 2012 | Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients. Rainer Schick, Christoph Ruland |
| 2012 | On Secure Communication over Wireless Sensor Networks. Stefan Rass, Michal Koza |
| 2012 | On Securing Communication from Profilers. Sandra Diaz-Santiago, Debrup Chakraborty |
| 2012 | On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function. Harris E. Michail, George Athanasiou, Andreas Gregoriades, George Theodoridis, Costas E. Goutis |
| 2012 | PPiTTA - Preserving Privacy in TV Targeted Advertising. Tzachy Reinman, Erez Waisbard |
| 2012 | Practical Applications of Homomorphic Encryption. Michael Brenner, Henning Perl, Matthew Smith |
| 2012 | Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed Databases. Nirali R. Nanavati, Devesh C. Jinwala |
| 2012 | Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud. Leyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik |
| 2012 | Private Outsourcing of Matrix Multiplication over Closed Semi-rings. Mikhail J. Atallah, Keith B. Frikken, Shumiao Wang |
| 2012 | Quantifying the Benefits of File Size Information for Forensic Hash Matching. Johan Garcia |
| 2012 | Quantitative Assessment of Cloud Security Level Agreements - A Case Study. Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri |
| 2012 | Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images. Nagaraj V. Dharwadkar, B. B. Amberker |
| 2012 | SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Pierangela Samarati, Wenjing Lou, Jianying Zhou |
| 2012 | SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics. Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer |
| 2012 | Secure File Allocation and Caching in Large-scale Distributed Systems. Alessio Di Mauro, Alessandro Mei, Sushil Jajodia |
| 2012 | Secure and Seamless Session Management in Mobile and Heterogeneous Environment. Ali Hammami, Noëmie Simoni |
| 2012 | Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer. Constantinos Patsakis, Kleanthis Dellios |
| 2012 | Security Policies in Dynamic Service Compositions. Julian Schütte, Hervais Simo Fhom, Mark Gall |
| 2012 | Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy. Yonglin Sun, Yongjun Wang, Yi Zhang |
| 2012 | Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems. Denis Efremov, Nikolay V. Pakulin |
| 2012 | Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures. Marek Klonowski, Piotr Syga, Wojciech Wodo |
| 2012 | Tampering with Java Card Exceptions - The Exception Proves the Rule. Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc |
| 2012 | The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes. Antigoni Polychroniadou, Konstantinos Chalkias, George Stephanides |
| 2012 | Towards Pervasive Cryptographic Access Control Models. Mikko Kiviharju |
| 2012 | Two Dragons - A Family of Fast Word-based Stream Ciphers. Matt Henricksen |
| 2012 | VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks. Julien Bringer, Alain Patey |
| 2012 | Verifying Privacy by Little Interaction and No Process Equivalence. Denis Butin, Giampaolo Bella |
| 2012 | Voice Passwords Revisited. Chenguang Yang, Ghaith Hammouri, Berk Sunar |
| 2012 | iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation. Sufian Hameed, Tobias Kloht, Xiaoming Fu |
| 2012 | lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks. Anna Sojka, Krzysztof Piotrowski |