| 2005 | A New Model for Dynamic Intrusion Detection. Tao Li, Xiaojie Liu, Hongbin Li |
| 2005 | A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time. Wei Lu, Issa Traoré |
| 2005 | A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. Fanyu Kong, Daxing Li |
| 2005 | A Novel Method to Maintain Privacy in Mobile Agent Applications. Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López |
| 2005 | An Immune-Based Model for Computer Virus Detection. Tao Li, Xiaojie Liu, Hongbin Li |
| 2005 | Constructing Secure Warrant-Based Proxy Signcryption Schemes. Yuan Zhou, Zhenfu Cao, Rongxing Lu |
| 2005 | Constructions of Almost Resilient Functions. Pinhui Ke, Tailin Liu, Qiao-Yan Wen |
| 2005 | Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. Wen Tao Zhu |
| 2005 | Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li |
| 2005 | Design and Implementation of an Inline Certified E-mail Service. Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco |
| 2005 | Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao |
| 2005 | Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. Zhenfeng Zhang, Jing Xu, Dengguo Feng |
| 2005 | Efficient Identity-Based Signatures and Blind Signatures. Zhenjie Huang, Kefei Chen, Yumin Wang |
| 2005 | How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. Chong-zhi Gao, Zheng-an Yao |
| 2005 | ID-Based Aggregate Signatures from Bilinear Pairings. Jing Xu, Zhenfeng Zhang, Dengguo Feng |
| 2005 | New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. Eun-Jun Yoon, Kee-Young Yoo |
| 2005 | Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. Lasse Øverlier, Tønnes Brekne, André Årnes |
| 2005 | On Securing RTP-Based Streaming Content with Firewalls. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
| 2005 | On the Performance and Analysis of DNS Security Extensions. Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese |
| 2005 | On the Security of Certificateless Signature Schemes from Asiacrypt 2003. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang |
| 2005 | On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. Haiyong Bao, Zhenfu Cao, Haifeng Qian |
| 2005 | Revaluation of Error Correcting Coding in Watermarking Channel. Limin Gu, Yanmei Fang, Jiwu Huang |
| 2005 | Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. Yang Xiang, Wanlei Zhou |
| 2005 | Security Analysis of Password-Authenticated Key Agreement Protocols. Kyung-Ah Shim, Seung-Hyun Seo |
| 2005 | Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection. Ruo Ando, Yoshiyasu Takefuji |
| 2005 | Similar Keys of Multivariate Quadratic Public Key Cryptosystems. Yuh-Hua Hu, Lih-Chung Wang, Chun-Yen Chou, Feipei Lai |
| 2005 | The Second-Preimage Attack on MD4. Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang |
| 2005 | Two Proxy Signcryption Schemes from Bilinear Pairings. Qin Wang, Zhenfu Cao |