| 2007 | A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. Geong Sen Poh, Keith M. Martin |
| 2007 | A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity. M. Venkatesan, P. Meenakshi Devi, K. Duraiswamy, K. Thiagarajah |
| 2007 | A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson |
| 2007 | A Purpose-Based Access Control Model. Naikuo Yang, Howard Barringer, Ning Zhang |
| 2007 | A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan |
| 2007 | A Secure Authenticated Key Agreement Protocol For Wireless Security. Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan |
| 2007 | A Secure Storage Service for the gLite Middleware. Diego Scardaci, Giordano Scuderi |
| 2007 | A Security Model for Detecting Suspicious Patterns in Physical Environment. Simon Fong, Zhuang Yan |
| 2007 | A Theoretical Security Model for Access Control and Security Assurance. Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng |
| 2007 | A Weighted Stego Image Detector for Sequential LSB Replacement. Andrew D. Ker |
| 2007 | A novel anti-collusion coding scheme tailored to track linear collusions. Kannan Karthik, Dimitrios Hatzinakos |
| 2007 | Accurate Application-Specific Sandboxing for Win32/Intel Binaries. Wei Li, Lap-Chung Lam, Tzi-cker Chiueh |
| 2007 | Addressing privacy issues in CardSpace. Waleed A. Alrodhan, Chris J. Mitchell |
| 2007 | An Analysis of Database Watermarking Security. Julien Lafaye |
| 2007 | An Architecture for Privacy Preserving Collaborative Filtering on Web Portals. Waseem Ahmad, Ashfaq A. Khokhar |
| 2007 | An Authentication Scheme Using Non-Commutative Semigroups. M. M. Chowdhury |
| 2007 | An Effective and Secure Buyer-Seller Watermarking Protocol. Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy |
| 2007 | An LSB Data Hiding Technique Using Prime Numbers. Sandipan Dey, Ajith Abraham, Sugata Sanyal |
| 2007 | Analysing the Security Threats against Network Convergence Architectures. Patroklos G. Argyroudis, Robert McAdoo, Stephen Toner, Linda Doyle, Donal O'Mahony |
| 2007 | Application of Language Models to Suspect Prioritisation and Suspect Likelihood in Serial Crimes. Richard Bache, Fabio Crestani, David Canter, Donna Youngs |
| 2007 | Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones |
| 2007 | Automatic Patch Generation for Buffer Overflow Attacks. Alexey Smirnov, Tzi-cker Chiueh |
| 2007 | Binding Update Authentication Scheme for Mobile IPv6. Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong |
| 2007 | Building Trustworthy Intrusion Detection through VM Introspection. Fabrizio Baiardi, Daniele Sgandurra |
| 2007 | CCARCH: Architecting Common Criteria Security Requirements. Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson |
| 2007 | Certified Email Delivery with Offline TTP. Hao Wang, Yuyi Ou, Jie Ling, Lu Liang, Xiang Xu |
| 2007 | Comparing the Trust and Security Models of Mobile Agents. Michail Fragkakis, Nikos Alexandris |
| 2007 | Computational Forensics: Towards Hybrid-Intelligent Crime Investigation. Katrin Franke, Sargur N. Srihari |
| 2007 | Craniofacial Superimposition in Forensic Identification using Genetic Algorithms. Lucia Ballerini, Oscar Cordón, Sergio Damas, José Santamaría, Inmaculada Alemán, Miguel Botella |
| 2007 | Cyber Threat Trend Analysis Model Using HMM. Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee |
| 2007 | DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. Kjetil Haslum, Ajith Abraham, Svein J. Knapskog |
| 2007 | Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. Anjali Sardana, Krishan Kumar, Ramesh Chandra Joshi |
| 2007 | Detection of Hidden Information in Webpages Based on Randomness. Junwei Huang, Xingming Sun, Huajun Huang, Gang Luo |
| 2007 | Detection of Web Defacements by means of Genetic Programming. Eric Medvet, Cyril De Fillon, Alberto Bartoli |
| 2007 | Dynamic Risk Mitigation in Computing Infrastructures. Reiko Ann Miura-Ko, Nicholas Bambos |
| 2007 | Early DoS Attack Detection using Smoothened Time-Series andWavelet Analysis. Pravin Shinde, Srinivas Guntupalli |
| 2007 | Enforcing Privacy by Means of an Ontology Driven XACML Framework. Dhiah el Diehn I. Abou-Tair, Stefan Berlik, Udo Kelter |
| 2007 | Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinux. Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli |
| 2007 | Enhancing Role-Based Access Control Model through Fuzzy Relations. Hassan Takabi, Morteza Amini, Rasool Jalili |
| 2007 | FPGA/ASIC based Cryptographic Object Store System. Dan Feng, Lanxiang Chen, Lingfang Zeng, Zhongying Niu |
| 2007 | Function-Based Authorization Constraints Specification and Enforcement. Wei Zhou, Christoph Meinel |
| 2007 | Fuzzy Key Extraction from Fingerprint Biometrics based on Dynamic Quantization Mechanism. Thian Song Ong, Andrew Beng Jin Teoh |
| 2007 | Generative Models for Fingerprint Individuality using Ridge Types. Gang Fang, Sargur N. Srihari, Harish Srinivasan |
| 2007 | HPRS: A Hybrid P2P Reputation System using File and Peer Rating. Srinivasan T., Varun Ramachandran, Arun Vedachalam, S. K. Ghosh |
| 2007 | Hierarchical Multi-Party Key Agreement for Wireless Networks. Sigurd Eskeland, Vladimir A. Oleshchuk |
| 2007 | IP protection: Detecting Email based breaches of confidence. Neil Cooke, Lee Gillam, Ahmet M. Kondoz |
| 2007 | Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance. Slobodan Petrovic, Katrin Franke |
| 2007 | Inclusion of a Montgomery Multiplier Unit into an Embedded Processor's Datapath to Speed-up Elliptic Curve Cryptography. Sandro Bartolini, Cinzia Castagnini, Enrico Martinelli |
| 2007 | Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluation. Daniel Ramos, Joaquin Gonzalez-Rodriguez, Grzegorz Zadora, Janina Zieba-Palus, Colin Aitken |
| 2007 | Integrating Multi-Modal Circuit Features within an Efficient Encryption System. Evangelos Papoutsis, Gareth Howells, Andrew B. T. Hopkins, Klaus D. McDonald-Maier |
| 2007 | Levels of Authentication Assurance: an Investigation. Aleksandra Nenadic, Ning Zhang, Li Yao, Terry Morrow |
| 2007 | Low-cost Anonymous Timed-Release Encryption. Dimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides |
| 2007 | Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance. Elvis Papalilo, Bernd Freisleben |
| 2007 | Metrics-based Evaluation of Slicing Obfuscations. Anirban Majumdar, Stephen Drape, Clark D. Thomborson |
| 2007 | Modeling Security Protocols as Games. Mohamed Mostafa Saleh, Mourad Debbabi |
| 2007 | Modelling Quality of Protection in Outsourced Business Processes. Fabio Massacci, Artsiom Yautsiukhin |
| 2007 | Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. Arnur G. Tokhtabayev, Victor A. Skormin |
| 2007 | On Detecting Packets Droppers in MANET: A Novel Low Cost Approach. Tarag Fahad, Djamel Djenouri, Robert Askwith |
| 2007 | On Periodic Properties of Interpolation and Their Application To Image Authentication. Babak Mahdian, Stanislav Saic |
| 2007 | On the Definition and Policies of Confidentiality. Johs Hansen Hammer, Gerardo Schneider |
| 2007 | Operational risk: acceptability criteria. Daniel Gideon Dresner, J. Robert (Bob) G. Wood |
| 2007 | Organized Anonymous Agents. Martijn Warnier, Frances M. T. Brazier |
| 2007 | Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom Ning Zhang, Ajith Abraham |
| 2007 | Program Fragmentation as a Metamorphic Software Protection. Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington |
| 2007 | Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. Muhammad Sher, Thomas Magedanz |
| 2007 | Protection of Mammograms Using Blind Steganography and Watermarking. Yue Li, Chang-Tsun Li, Chia-Hung Wei |
| 2007 | Research on Steganalysis for Text Steganography Based on Font Format. Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan |
| 2007 | Resource Classification Based Negotiation in Web Services. Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar |
| 2007 | Risk management in coalition networks. Wim Mees |
| 2007 | SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy. Yue Zhang, James B. D. Joshi |
| 2007 | Second-LSB-Dependent Robust Watermarking for Relational Database. Xiangrong Xiao, Xingming Sun, Minggang Chen |
| 2007 | Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card. Satish Devane, Madhumita Chatterjee, Deepak B. Phatak |
| 2007 | Secure M-commerce Transactions: A Third Party Based Signature Protocol. Li-Sha He, Ning Zhang, Li-Rong He, Ian Rogers |
| 2007 | Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. Hassan Takabi, Morteza Amini, Rasool Jalili |
| 2007 | Shoeprint Image Retrieval Based on Local Image Features. Danny Crookes, Hongjiang Su, Ahmed Bouridane, Mourad Gueham |
| 2007 | Statistical Disk Cluster Classification for File Carving. Cor J. Veenman |
| 2007 | Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. Yan Zhu, Chang-Tsun Li, Hong-Jia Zhao |
| 2007 | Study of structural features of handwritten grapheme 'th' for writer identification. Vladimir Pervouchine, Graham Leedham |
| 2007 | Team Edit Automata for Testing Security Property. Zhenrong Yang, Aiman Hanna, Mourad Debbabi |
| 2007 | The Influence of Frame Length on Speaker Identification Performance. Donato Impedovo, Mario Refice |
| 2007 | Threshold SKI Protocol for ID-based Cryptosystems. Ashutosh Saxena |
| 2007 | Towards an Autonomic Security System for Mobile Ad Hoc Networks. Mohamad Aljnidi, Jean Leneutre |
| 2007 | Vulnerability Assessment by Learning Attack Specifications in Graphs. Virginia N. L. Franqueira, Raul H. C. Lopes |