| 2003 | A composable cryptographic library with nested operations. Michael Backes, Birgit Pfitzmann, Michael Waidner |
| 2003 | A new CRT-RSA algorithm secure against bellcore attacks. Johannes Blömer, Martin Otto, Jean-Pierre Seifert |
| 2003 | A pairwise key pre-distribution scheme for wireless sensor networks. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney |
| 2003 | Anomaly detection of web-based attacks. Christopher Krügel, Giovanni Vigna |
| 2003 | Automatic generation of two-party computations. Philip D. MacKenzie, Alina Oprea, Michael K. Reiter |
| 2003 | Balancing confidentiality and efficiency in untrusted relational DBMSs. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
| 2003 | Buffer overrun detection using linear programming and static analysis. Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek |
| 2003 | CDiff: a new reduction technique for constraint-based analysis of security protocols. David A. Basin, Sebastian Mödersheim, Luca Viganò |
| 2003 | Countering code-injection attacks with instruction-set randomization. Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis |
| 2003 | Cryptographic tamper evidence. Gene Itkis |
| 2003 | DoS protection for UDP-based protocols. Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld |
| 2003 | Efficiency improvements for signature schemes with tight security reductions. Jonathan Katz, Nan Wang |
| 2003 | Efficient self-healing group key distribution with revocation capability. Donggang Liu, Peng Ning, Kun Sun |
| 2003 | Enhancing byte-level network intrusion detection signatures with context. Robin Sommer, Vern Paxson |
| 2003 | Establishing pairwise keys in distributed sensor networks. Donggang Liu, Peng Ning |
| 2003 | Hop-count filtering: an effective defense against spoofed DDoS traffic. Cheng Jin, Haining Wang, Kang G. Shin |
| 2003 | Incentive-based modeling and inference of attacker intent, objectives, and strategies. Peng Liu, Wanyu Zang |
| 2003 | LEAP: efficient security mechanisms for large-scale distributed sensor networks. Sencun Zhu, Sanjeev Setia, Sushil Jajodia |
| 2003 | Learning attack strategies from intrusion alerts. Peng Ning, Dingbang Xu |
| 2003 | MECA: an extensible, expressive system and language for statically checking security properties. Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler |
| 2003 | Monitoring and early warning for internet worms. Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley |
| 2003 | Obfuscation of executable code to improve resistance to static disassembly. Cullen Linn, Saumya K. Debray |
| 2003 | On permissions, inheritance and role hierarchies. Jason Crampton |
| 2003 | On the performance, feasibility, and use of forward-secure signatures. Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel |
| 2003 | Origin authentication in interdomain routing. William Aiello, John Ioannidis, Patrick D. McDaniel |
| 2003 | PPay: micropayments for peer-to-peer systems. Beverly Yang, Hector Garcia-Molina |
| 2003 | Print signatures for document authentication. Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli |
| 2003 | Privacy cognizant information systems. Rakesh Agrawal |
| 2003 | Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003 Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger |
| 2003 | Randomized instruction set emulation to disrupt binary code injection attacks. Elena Gabriela Barrantes, David H. Ackley, Trek S. Palmer, Darko Stefanovic, Dino Dai Zovi |
| 2003 | Receiver anonymity via incomparable public keys. Brent R. Waters, Edward W. Felten, Amit Sahai |
| 2003 | Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. Xinyuan Wang, Douglas S. Reeves |
| 2003 | Security proofs for an efficient password-based key exchange. Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
| 2003 | The blocker tag: selective blocking of RFID tags for consumer privacy. Ari Juels, Ronald L. Rivest, Michael Szydlo |
| 2003 | Using graphic turing tests to counter automated DDoS attacks against web servers. William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein |
| 2003 | XML access control using static analysis. Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada |
| 2003 | k-anonymous message transmission. Luis von Ahn, Andrew Bortz, Nicholas J. Hopper |