| 2012 | Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis |
| 2011 | An On-Line Learning Statistical Model to Detect Malicious Web Requests. Harald Lampesberger, Philipp Winter, Markus Zeilinger, Eckehard Hermann |
| 2011 | Analyzing the Gold Star Scheme in a Split Tor Network. Benedikt Westermann, Pern Hui Chia, Dogan Kesdogan |
| 2011 | Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag. Thomas Plos, Martin Feldhofer |
| 2011 | Anonymity for Key-Trees with Adaptive Adversaries. Michael Beye, Thijs Veugen |
| 2011 | Behavioral Mimicry Covert Communication. Seyed Ali Ahmadzadeh, Gordon B. Agnew |
| 2011 | Build and Test Your Own Network Configuration. Saeed Al-Haj, Padmalochan Bera, Ehab Al-Shaer |
| 2011 | Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks. Hemant Sengar, Xinyuan Wang, Arthur Nichols |
| 2011 | CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. Huijun Xiong, Xinwen Zhang, Wei Zhu, Danfeng Yao |
| 2011 | Context-Related Access Control for Mobile Caching. Zhi Xu, Kun Bai, Sencun Zhu, Leslie S. Liu, Randy Moulic |
| 2011 | Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks. Chowdhury Sayeed Hyder, Brendan Grebur, Li Xiao |
| 2011 | Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning. Shimrit Tzur-David, Kiril Lashchiver, Danny Dolev, Tal Anker |
| 2011 | Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks. Zhiyun Qian, Zhuoqing Morley Mao, Ammar Rayes, David Jaffe |
| 2011 | Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. Wojciech Mostowski, Pim Vullers |
| 2011 | Insecurity in Public-Safety Communications: APCO Project 25. Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann, Matthew Robert |
| 2011 | K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access. Saman Zarandioon, Danfeng (Daphne) Yao, Vinod Ganapathy |
| 2011 | Location Privacy and Attacker Knowledge: Who Are We Fighting against? Rinku Dewri |
| 2011 | Multi-party Private Web Search with Untrusted Partners. Cristina Romero-Tris, Jordi Castellà-Roca, Alexandre Viejo |
| 2011 | NetFlow Based Network Protection. Vojtech Krmicek, Jan Vykopal |
| 2011 | On Detection of Erratic Arguments. Jin Han, Qiang Yan, Robert H. Deng, Debin Gao |
| 2011 | Optimistic Fair Exchange of Ring Signatures. Lie Qu, Guilin Wang, Yi Mu |
| 2011 | PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks. Manuel Crotti, Diego Ferri, Francesco Gringoli, Manuel Peli, Luca Salgarelli |
| 2011 | Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines. Hanjun Gao, Lina Wang, Wei Liu, Yang Peng, Hao Zhang |
| 2011 | Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data. Akshay Dua, Nirupama Bulusu, Wu-chang Feng |
| 2011 | SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu |
| 2011 | Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems. Gaspar Modelo-Howard, Jevin Sweval, Saurabh Bagchi |
| 2011 | Secure and Practical Key Distribution for RFID-Enabled Supply Chains. Tieyan Li, Yingjiu Li, Guilin Wang |
| 2011 | Security Analysis of Leap-of-Faith Protocols. Viet Pham, Tuomas Aura |
| 2011 | Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract]. Chunyu Tang, David A. Naumann, Susanne Wetzel |
| 2011 | T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks. Steffen Wagner, Christoph Krauß, Claudia Eckert |
| 2011 | Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots. Deepa Srinivasan, Xuxian Jiang |
| 2011 | Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane. Sarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay |
| 2011 | Trading Elephants for Ants: Efficient Post-attack Reconstitution. Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia |
| 2011 | Unilateral Antidotes to DNS Poisoning. Amir Herzberg, Haya Schulmann |
| 2011 | Winning with DNS Failures: Strategies for Faster Botnet Detection. Sandeep Yadav, A. L. Narasimha Reddy |
| 2011 | v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks. Amiya Kumar Maji, Saurabh Bagchi |