| 2002 | A key-management scheme for distributed sensor networks. Laurent Eschenauer, Virgil D. Gligor |
| 2002 | A reputation-based approach for choosing reliable resources in peer-to-peer networks. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante |
| 2002 | A temporal key management scheme for secure broadcasting of XML documents. Elisa Bertino, Barbara Carminati, Elena Ferrari |
| 2002 | Almost entirely correct mixing with applications to voting. Dan Boneh, Philippe Golle |
| 2002 | Asynchronous verifiable secret sharing and proactive cryptosystems. Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl |
| 2002 | Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
| 2002 | Authenticated-encryption with associated-data. Phillip Rogaway |
| 2002 | Code red worm propagation modeling and analysis. Cliff Changchun Zou, Weibo Gong, Donald F. Towsley |
| 2002 | Constructing attack scenarios through correlation of intrusion alerts. Peng Ning, Yun Cui, Douglas S. Reeves |
| 2002 | DRM: doesn't realy mean digital copyright management. L. Jean Camp |
| 2002 | Defending against redirect attacks in mobile IP. Robert H. Deng, Jianying Zhou, Feng Bao |
| 2002 | Design and implementation of the Jan Camenisch, Els Van Herreweghen |
| 2002 | Efficient packet marking for large-scale IP traceback. Michael T. Goodrich |
| 2002 | Efficient, DoS-resistant, secure key exchange for internet protocols. William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis |
| 2002 | Generic implementations of elliptic curve cryptography using partial reduction. Nils Gura, Hans Eberle, Sheueling Chang Shantz |
| 2002 | MOPS: an infrastructure for examining security properties of software. Hao Chen, David A. Wagner |
| 2002 | Mimicry attacks on host-based intrusion detection systems. David A. Wagner, Paolo Soto |
| 2002 | Policy algebras for access control the predicate case. Duminda Wijesekera, Sushil Jajodia |
| 2002 | Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002 Vijayalakshmi Atluri |
| 2002 | Query-flood DoS attacks in gnutella. Neil Daswani, Hector Garcia-Molina |
| 2002 | Runtime verification of authorization hook placement for the linux security modules framework. Antony Edwards, Trent Jaeger, Xiaolan Zhang |
| 2002 | Scalable, graph-based network vulnerability analysis. Paul Ammann, Duminda Wijesekera, Saket Kaushik |
| 2002 | Securing passwords against dictionary attacks. Benny Pinkas, Tomas Sander |
| 2002 | Sensor-based intrusion detection for intra-domain distance-vector routing. Vishal Mittal, Giovanni Vigna |
| 2002 | Silicon physical random functions. Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
| 2002 | Specification-based anomaly detection: a new approach for detecting network intrusions. R. Sekar, Ajay Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou |
| 2002 | Tarzan: a peer-to-peer anonymizing network layer. Michael J. Freedman, Robert Morris |
| 2002 | The verification of an industrial payment protocol: the SET purchase phase. Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci |