| 2011 | A HTTP cookie covert channel. William Huba, Bo Yuan, Daryl Johnson, Peter Lutz |
| 2011 | A different algebraic analysis of the ZUC stream cipher. Mufeed Juma AlMashrafi |
| 2011 | A model-based attack injection approach for security validation. Anderson Nunes Paiva Morais, Ana R. Cavalli, Eliane Martins |
| 2011 | A secure and anonymous cooperative sensing protocol for cognitive radio networks. Helena Rifà-Pous, Carles Garrigues |
| 2011 | A sybil attack detection approach using neighboring vehicles in VANET. Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Nitesh Kumar Prajapati |
| 2011 | Acceleration of packet filtering using gpgpu. Manoj Singh Gaur, Vijay Laxmi, Lakshminarayanan V., Kamal Cahndra, Mark Zwolinski |
| 2011 | Algebraic analysis of GOST encryption algorithm. Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro |
| 2011 | Algebraic analysis of the SSS stream cipher. Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson |
| 2011 | An approach to enhance the security of remote health monitoring systems. Mahmoud Elkhodr, Seyed A. Shahrestani, Hon Cheung |
| 2011 | Collusion resistant fingerprinting of digital audio. Andrew Z. Tirkel, Thomas E. Hall, Charles F. Osborne, Nicholas Meinhold, Oscar Moreno |
| 2011 | Corporate networks security evaluation based on attack graphs. Evgeny Sergeevich Abramov, Artem Viktorovich Andreev, Denis Valerievich Mordvin, Oleg B. Makarevich |
| 2011 | Counteracting DDoS attacks in WLAN. Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala |
| 2011 | Counterfactually reasoning about security. Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj |
| 2011 | Cryptanalysis of the stream cipher BEAN. Martin Ågren, Martin Hell |
| 2011 | Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi |
| 2011 | Detour attack in OLSR. Manoj Singh Gaur, Vijay Laxmi, Manish Kumar, Rajbir Kaur |
| 2011 | Different models of information protection system, based on the functional knapsack. Valeriy O. Osipyan |
| 2011 | Echo hiding based stereo audio watermarking against pitch-scaling attacks. Iynkaran Natgunanathan, Yong Xiang |
| 2011 | Exploration of a hand-based graphical password scheme. Haichang Gao, Licheng Ma, Jinhua Qiu, Xiyang Liu |
| 2011 | Extending the Scope of cardspace. Haitham S. Al-Sinani, Chris J. Mitchell |
| 2011 | Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba |
| 2011 | Fault tolerance for fight-through: a basis for strategic survival. Kevin A. Kwiat |
| 2011 | Formal analysis of usage control policies. Boulares Ouchenne, Ousmane Koné |
| 2011 | Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation. Bogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux |
| 2011 | Logic based authorization program and its implementation. Chun Ruan, Seyed A. Shahrestani |
| 2011 | Microcontroller-based implementation of parsekey+ for limited resources embedded applications. Atilla Elçi, Behnam Rahnama, Reza Makvandi |
| 2011 | Model checking security policy model using both UML static and dynamic diagrams. Liang Cheng, Yang Zhang |
| 2011 | Obscurity of network security course curriculum. Suleyman Kondakci |
| 2011 | On automatic detection of SQL injection attacks by the feature extraction of the single character. Michio Sonoda, Takeshi Matsuda, Daiki Koizumi, Shigeichi Hirasawa |
| 2011 | On the impacts of join and leave on the propagation ratio of topology-aware active worms. Ahmad Jafarabadi, Mohammad Abdollahi Azgomi |
| 2011 | On the security and practicality of a buyer seller watermarking protocol for DRM. Geong Sen Poh, Muhammad Reza Z'aba |
| 2011 | Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011 Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran |
| 2011 | Proposal and implementation of enhanced HDD authentication that enables self-wipe. Zhaogong Guo, Kouichi Yasaki, Yousuke Nakamura, Kazuaki Nimura, Isamu Yamada |
| 2011 | Rational distance-bounding protocols over noisy channel. Long Hoang Nguyen |
| 2011 | Research on survivability metrics based on survivable process of network system. Liang Ming, Minhuan Huang, Dongxia Wang, Xiaohui Kuang, Chunlei Wang, Xuewei Feng |
| 2011 | Rethinking cyber security. Vijay Varadharajan |
| 2011 | Secure random number generation in wireless sensor networks. Giuseppe Lo Re, Fabrizio Milazzo, Marco Ortolani |
| 2011 | Security analysis of a femtocell device. Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert |
| 2011 | TW-KEAP: an efficient four-party key exchange protocol for end-to-end communications. Wei-Kuo Chiang, Jian-Hao Chen |
| 2011 | The optimal linear multi-secret sharing scheme for non-threshold access structure(student contribution). Shu-guang Dai, Chun-Ming Tang, Yuenai Chen |
| 2011 | Towards hiding federated digital identity: stop-dissemination mechanism in content-centric networking. Amine Elabidi, Ghazi Ben Ayed, Sonia Mettali Gammar, Farouk Kamoun |
| 2011 | Trust based fusion over noisy channels through anomaly detection in cognitive radio networks. Shameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat |
| 2011 | Using decision trees for generating adaptive SPIT signatures. Mohamed Nassar, Sylvain Martin, Guy Leduc, Olivier Festor |
| 2011 | WinSEND: Windows SEcure Neighbor Discovery. Hosnieh Rafiee, Ahmad AlSa'deh, Christoph Meinel |