| 2001 | A Chinese wall security model for decentralized workflow systems. Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni |
| 2001 | A new approach to DNS security (DNSSEC). Giuseppe Ateniese, Stefan Mangard |
| 2001 | A verifiable secret shuffle and its application to e-voting. C. Andrew Neff |
| 2001 | Accountable-subgroup multisignatures: extended abstract. Silvio Micali, Kazuo Ohta, Leonid Reyzin |
| 2001 | An efficient security verification method for programs with stack inspection. Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki |
| 2001 | CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001. Michael K. Reiter, Pierangela Samarati |
| 2001 | Constraint solving for bounded-process cryptographic protocol analysis. Jonathan K. Millen, Vitaly Shmatikov |
| 2001 | Delegation of cryptographic servers for capture-resilient devices. Philip D. MacKenzie, Michael K. Reiter |
| 2001 | Design and implementation of a flexible RBAC-service in an object-oriented scripting language. Gustaf Neumann, Mark Strembeck |
| 2001 | Distributed credential chain discovery in trust management: extended abstract. Ninghui Li, William H. Winsborough, John C. Mitchell |
| 2001 | Error-tolerant password recovery. Niklas Frykholm, Ari Juels |
| 2001 | Events in security protocols. Federico Crazzolara, Glynn Winskel |
| 2001 | Flexible authentication of XML documents. Premkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine |
| 2001 | Formalizing GDOI group key management requirements in NPATRL. Catherine Meadows, Paul F. Syverson |
| 2001 | Inductive methods and contract-signing protocols. Rohit Chadha, Max I. Kanovich, Andre Scedrov |
| 2001 | Interoperable strategies in automated trust negotiation. Ting Yu, Marianne Winslett, Kent E. Seamons |
| 2001 | OCB: a block-cipher mode of operation for efficient authenticated encryption. Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz |
| 2001 | On the relationship between strand spaces and multi-agent systems. Joseph Y. Halpern, Riccardo Pucella |
| 2001 | Paillier's cryptosystem revisited. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen |
| 2001 | Policy algebras for access control: the propositional case. Duminda Wijesekera, Sushil Jajodia |
| 2001 | Practical forward secure group signature schemes. Dawn Xiaodong Song |
| 2001 | Provably authenticated group Diffie-Hellman key exchange. Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater |
| 2001 | Securely combining public-key cryptosystems. Stuart Haber, Benny Pinkas |
| 2001 | Tangler: a censorship-resistant publishing system based on document entanglements. Marc Waldman, David Mazières |
| 2001 | The BiBa one-time signature and broadcast authentication protocol. Adrian Perrig |
| 2001 | The faithfulness of abstract protocol analysis: message authentication. Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck |
| 2001 | The performance of public key-enabled kerberos authentication in mobile computing applications. Alan Harbitter, Daniel A. Menascé |
| 2001 | Twin signatures: an alternative to the hash-and-sign paradigm. David Naccache, David Pointcheval, Jacques Stern |