| 2004 | A Best Practice for Root CA Key Update in PKI. Inkyoung Jeun, Jongwook Park, TaeKyu Choi, Sang Wan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin |
| 2004 | A Fully-Functional Group Signature Scheme over Only Known-Order Group. Atsuko Miyaji, Kozue Umeda |
| 2004 | A Novel Framework for Alert Correlation and Understanding. Dong Yu, Deborah A. Frincke |
| 2004 | A Parallel Intrusion Detection System for High-Speed Networks. Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li |
| 2004 | A Pay-per-Use DoS Protection Mechanism for the Web. Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein |
| 2004 | Advanced Packet Marking Mechanism with Pushback for IP Traceback. Hyung-Woo Lee |
| 2004 | An Improved Algorithm for uP + vQ Using JSF BaiJie Kuang, Yuefei Zhu, Yajuan Zhang |
| 2004 | Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings Markus Jakobsson, Moti Yung, Jianying Zhou |
| 2004 | Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee |
| 2004 | CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. Michael E. Locasto, Angelos D. Keromytis |
| 2004 | Centralized Management of Virtual Security Zones in IP Networks. Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen |
| 2004 | Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi |
| 2004 | Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao |
| 2004 | Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung |
| 2004 | Deniable Ring Authentication Revisited. Willy Susilo, Yi Mu |
| 2004 | Evaluating Security of Voting Schemes in the Universal Composability Framework. Jens Groth |
| 2004 | FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy. Daisuke Inoue, Masahiro Kuroda |
| 2004 | Key Agreement Using Statically Keyed Authenticators. Colin Boyd, Wenbo Mao, Kenneth G. Paterson |
| 2004 | Limited Verifier Signature from Bilinear Pairings. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim |
| 2004 | Low-Latency Cryptographic Protection for SCADA Communications. Andrew K. Wright, John A. Kinast, Joe McCarty |
| 2004 | More Generalized Clock-Controlled Alternating Step Generator. Ali A. Kanso |
| 2004 | New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p Palash Sarkar, Pradeep Kumar Mishra, Rana Barua |
| 2004 | On the Security of Cryptosystems with All-or-Nothing Transform. Rui Zhang, Goichiro Hanaoka, Hideki Imai |
| 2004 | One-Round Protocols for Two-Party Authenticated Key Exchange. Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee |
| 2004 | Password Authenticated Key Exchange Using Quadratic Residues. Muxiang Zhang |
| 2004 | Private Keyword-Based Push and Pull with Applications to Anonymous Communication. Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang |
| 2004 | S-RIP: A Secure Distance Vector Routing Protocol. Tao Wan, Evangelos Kranakis, Paul C. van Oorschot |
| 2004 | SQLrand: Preventing SQL Injection Attacks. Stephen W. Boyd, Angelos D. Keromytis |
| 2004 | Secure Conjunctive Keyword Search over Encrypted Data. Philippe Golle, Jessica Staddon, Brent R. Waters |
| 2004 | Security Analysis of CRT-Based Cryptosystems. Katsuyuki Okeya, Tsuyoshi Takagi |
| 2004 | Security Measurements of Steganographic Systems. Weiming Zhang, Shiqu Li |
| 2004 | Some Observations on Zap and Its Applications. Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu |
| 2004 | Success Probability in Chi Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano |
| 2004 | Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai |
| 2004 | Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa |
| 2004 | Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. Shuhong Wang, Jie Wang, Maozhi Xu |
| 2004 | X Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo |