| 2010 | A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones. Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt |
| 2010 | A Smart Card Implementation of the McEliece PKC. Falko Strenzke |
| 2010 | A Very Compact Hardware Implementation of the KASUMI Block Cipher. Dai Yamamoto, Kouichi Itoh, Jun Yajima |
| 2010 | An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater |
| 2010 | Attribute-Based Encryption with Break-Glass. Achim D. Brucker, Helmut Petritsch, Stefan G. Weber |
| 2010 | Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci |
| 2010 | Design and Analysis of a Generalized Canvas Protocol. Marián Novotný |
| 2010 | Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines. Alexandre Venelli |
| 2010 | Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures. Michael Braun, Ulrike Meyer, Susanne Wetzel |
| 2010 | Efficient and Effective Buffer Overflow Protection on ARM Processors. Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens |
| 2010 | Evaluation Metrics of Physical Non-invasive Security. Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan |
| 2010 | Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios. Giovanni Russello, Enrico Scalavino |
| 2010 | Fraud Detection for Voice over IP Services on Next-Generation Networks. Igor Ruiz-Agundez, Yoseba K. Penya, Pablo García Bringas |
| 2010 | Generic Constructions of Biometric Identity Based Encryption Systems. Neyire Deniz Sarier |
| 2010 | Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner |
| 2010 | Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML. Sergio Sánchez García, Ana Gómez Oliva |
| 2010 | Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron |
| 2010 | MoteAODV - An AODV Implementation for TinyOS 2.0. Werner Backes, Jared Cordasco |
| 2010 | Novel FPGA-Based Signature Matching for Deep Packet Inspection. Nitesh B. Guinde, Sotirios G. Ziavras |
| 2010 | On the Security of a Two-Factor Authentication Scheme. Luigi Catuogno, Clemente Galdi |
| 2010 | Practical Schemes for Privacy and Security Enhanced RFID. Jaap-Henk Hoepman, Rieks Joosten |
| 2010 | Predicting and Preventing Insider Threat in Relational Database Systems. Qussai Yaseen, Brajendra Panda |
| 2010 | Proxy Smart Card Systems. Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti |
| 2010 | Random Number Generation Based on Fingerprints. Shkodran Gerguri, Václav Matyás Jr., Zdenek Ríha, Ludek Smolík |
| 2010 | Secure and Usable Out-Of-Band Channels for Ronald Kainda, Ivan Flechais, A. W. Roscoe |
| 2010 | Security Analysis of Mobile Phones Used as OTP Generators. Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole |
| 2010 | The Design of Secure and Efficient P2PSIP Communication Systems. Xianghan Zheng, Vladimir A. Oleshchuk |
| 2010 | The Market Failure of Anonymity Services. Heiko Rossnagel |
| 2010 | Towards Electrical, Integrated Implementations of SIMPL Systems. Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba |
| 2010 | Trust in Peer-to-Peer Content Distribution Protocols. Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs |
| 2010 | Website Credential Storage and Two-Factor Web Authentication with a Java SIM. Jonathan Hart, Konstantinos Markantonakis, Keith Mayes |