| 2011 | A Comparison of Post-Processing Techniques for Biased Random Number Generators. Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik How Tan |
| 2011 | A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines. Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer |
| 2011 | A SMS-Based Mobile Botnet Using Flooding Algorithm. Jingyu Hua, Kouichi Sakurai |
| 2011 | A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area. Savvas Mousionis, Alex Vakaloudis, Constantinos S. Hilas |
| 2011 | AES Variants Secure against Related-Key Differential and Boomerang Attacks. Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann |
| 2011 | Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. Mark Manulis, Bertram Poettering |
| 2011 | An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control. Paolo D'Arco |
| 2011 | An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture. Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page |
| 2011 | Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard. Mohammad Hassan Habibi, Mahdi R. Alaghband, Mohammad Reza Aref |
| 2011 | Can Code Polymorphism Limit Information Leakage? Antoine Amarilli, Sascha Müller, David Naccache, Dan Page, Pablo Rauzy, Michael Tunstall |
| 2011 | Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali |
| 2011 | Entropy of Selectively Encrypted Strings. Reine Lundin, Stefan Lindskog |
| 2011 | FIRE: Fault Injection for Reverse Engineering. Manuel San Pedro, Mate Soos, Sylvain Guilley |
| 2011 | Formal Analysis of Security Metrics and Risk. Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin |
| 2011 | Formal Framework for the Evaluation of Waveform Resynchronization Algorithms. Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger |
| 2011 | Hardware Trojan Side-Channels Based on Physical Unclonable Functions. Zheng Gong, Marc X. Makkes |
| 2011 | Information Leakage Discovery Techniques to Enhance Secure Chip Design. Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia |
| 2011 | Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings Claudio A. Ardagna, Jianying Zhou |
| 2011 | Leakage Squeezing Countermeasure against High-Order Attacks. Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger |
| 2011 | Mobile Electronic Identity: Securing Payment on Mobile Phones. Chen Bangdao, A. W. Roscoe |
| 2011 | Practical Attacks on HB and HB+ Protocols. Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada |
| 2011 | Privacy Protection for Smartphones: An Ontology-Based Firewall. Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger |
| 2011 | Privacy Respecting Targeted Advertising for Social Networks. Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg |
| 2011 | Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems. Antonios Gouglidis, Ioannis Mavridis |
| 2011 | SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key. Chunhua Chen, Chris J. Mitchell, Shaohua Tang |
| 2011 | STORM - Collaborative Security Management Environment. Theodoros Ntouskas, Giorgos Pentafronimos, Spyridon Papastergiou |
| 2011 | Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network. Kun Peng |
| 2011 | Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library. Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda |
| 2011 | Trust Agreement in Wireless Mesh Networks. Andreas Noack |