| 2010 | A Formal Definition of Online Abuse-Freeness. Ralf Küsters, Henning Schnoor, Tomasz Truderung |
| 2010 | A Generic Construction of Dynamic Single Sign-on with Strong Security. Jinguang Han, Yi Mu, Willy Susilo, Jun Yan |
| 2010 | A New Information Leakage Measure for Anonymity Protocols. Sami Zhioua |
| 2010 | A Study on False Channel Condition Reporting Attacks in Wireless Networks. Dongho Kim, Yih-Chun Hu |
| 2010 | Analyzing and Exploiting Network Behaviors of Malware. Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu |
| 2010 | Attacking Beacon-Enabled 802.15.4 Networks. Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem A. Beyah |
| 2010 | CED Luciana Marconi, Mauro Conti, Roberto Di Pietro |
| 2010 | Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. Patrick Traynor |
| 2010 | Context-Aware Usage Control for Android. Guangdong Bai, Liang Gu, Tao Feng, Yao Guo, Xiangqun Chen |
| 2010 | DeCore: Detecting Content Repurposing Attacks on Clients' Systems. Smitha Sundareswaran, Anna Cinzia Squicciarini |
| 2010 | Efficient Isolation of Trusted Subsystems in Embedded Systems. Raoul Strackx, Frank Piessens, Bart Preneel |
| 2010 | Enhancing Host Security Using External Environment Sensors. Ee-Chien Chang, Liming Lu, Yongzheng Wu, Roland H. C. Yap, Jie Yu |
| 2010 | Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast. Omar I. Al-Bataineh, Ron van der Meyden |
| 2010 | FADE: Secure Overlay Cloud Storage with File Assured Deletion. Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia J. Perlman |
| 2010 | Hidden Markov Models for Automated Protocol Learning. Sean Whalen, Matt Bishop, James P. Crutchfield |
| 2010 | Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang |
| 2010 | Inexpensive Email Addresses Aram Yegenian, Tassos Dimitriou |
| 2010 | On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS. Rinku Dewri, Indrakshi Ray, Indrajit Ray, L. Darrell Whitley |
| 2010 | Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks. Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu |
| 2010 | Privacy Administration in Distributed Service Infrastructure. Nabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2010 | Realizing a Source Authentic Internet. Toby Ehrenkranz, Jun Li, Patrick D. McDaniel |
| 2010 | SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu, Hongsheng Xi |
| 2010 | Saving Energy on WiFi with Required IPsec. Youngsang Shin, Steven A. Myers, Minaxi Gupta |
| 2010 | Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou |
| 2010 | Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings Sushil Jajodia, Jianying Zhou |
| 2010 | Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. Mihaela Ion, Giovanni Russello, Bruno Crispo |
| 2010 | Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly. Andrew J. Kalafut, Minaxi Gupta, Pairoj Rattadilok, Pragneshkumar Patel |
| 2010 | The Hitchhiker's Guide to DNS Cache Poisoning. Sooel Son, Vitaly Shmatikov |
| 2010 | Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh |