| 2012 | An Efficient Lattice-Based Secret Sharing Construction. Rachid El Bansarkhani, Mohammed Meziani |
| 2012 | Another Fallen Hash-Based RFID Authentication Protocol. Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi |
| 2012 | Assisting Server for Secure Multi-Party Computation. Jens-Matthias Bohli, Wenting Li, Jan Seedorf |
| 2012 | Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices. Johann Großschädl, Dan Page, Stefan Tillich |
| 2012 | HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network. G. Kirubavathi Venkatesh, R. Anitha Nadarajan |
| 2012 | HiPoLDS: A Security Policy Language for Distributed Systems. Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier |
| 2012 | How to Break EAP-MD5. Fanbao Liu, Tao Xie |
| 2012 | Impossible Differential Cryptanalysis of Reduced-Round LBlock. Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci |
| 2012 | Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga |
| 2012 | Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android. Daniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff |
| 2012 | On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems. Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger |
| 2012 | Optimal Parameters for Efficient Two-Party Computation Protocols. Chaya Ganesh, C. Pandu Rangan |
| 2012 | Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications. Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer |
| 2012 | Privacy Preservation of User History Graph. Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake |
| 2012 | Privacy Preserving Social Network Publication on Bipartite Graphs. Jian Zhou, Jiwu Jing, Ji Xiang, Lei Wang |
| 2012 | ROAC: A Role-Oriented Access Control Model. Nezar Nassr, Eric Steegmans |
| 2012 | Recent Developments in Low-Level Software Security. Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, Frank Piessens |
| 2012 | Towards a C2I Platform for Combating the Cyber-Threat. Paul Kearney |
| 2012 | Veracity, Plausibility, and Reputation. Dieter Gollmann |