| 1997 | A Calculus for Cryptographic Protocols: The Spi Calculus. Martín Abadi, Andrew D. Gordon |
| 1997 | A New On-Line Cash Check Scheme. Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair |
| 1997 | Asymmetric Fingerprinting for Larger Collusions. Birgit Pfitzmann, Michael Waidner |
| 1997 | Authentication via Keystroke Dynamics. Fabian Monrose, Aviel D. Rubin |
| 1997 | CCS '97, Proceedings of the 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997. Richard Graveman, Philippe A. Janson, Clifford Neuman, Li Gong |
| 1997 | Conditional Purchase Orders. John Kelsey, Bruce Schneier |
| 1997 | Fair Exchange with a Semi-Trusted Third Party (extended abstract). Matthew K. Franklin, Michael K. Reiter |
| 1997 | Improved Security Bounds for Pseudorandom Permutations. Jacques Patarin |
| 1997 | New Blind Signatures Equivalent to Factorization (extended abstract). David Pointcheval, Jacques Stern |
| 1997 | On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack. Marc Joye, Jean-Jacques Quisquater |
| 1997 | Optimistic Protocols for Fair Exchange. N. Asokan, Matthias Schunter, Michael Waidner |
| 1997 | Path Independence for Authentication in Large-Scale Systems. Michael K. Reiter, Stuart G. Stubblebine |
| 1997 | Proactive Password Checking with Decision Trees. Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo |
| 1997 | Proactive Public Key and Signature Systems. Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung |
| 1997 | Secure Names for Bit-Strings. Stuart Haber, W. Scott Stornetta |
| 1997 | The Security of Static Typing with Dynamic Linking. Drew Dean |
| 1997 | The Specification and Implementation of "Commercial" Security Requirements Including Dynamic Segregation of Duties. Simon N. Foley |
| 1997 | Verifiable Partial Key Escrow. Mihir Bellare, Shafi Goldwasser |