| 2005 | A framework for concrete reputation-systems with applications to history-based access control. Karl Krukow, Mogens Nielsen, Vladimiro Sassone |
| 2005 | A model and architecture for pseudo-random generation with applications to /dev/random. Boaz Barak, Shai Halevi |
| 2005 | A modular correctness proof of IEEE 802.11i and TLS. Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell |
| 2005 | Aggregated path authentication for efficient BGP security. Meiyuan Zhao, Sean W. Smith, David M. Nicol |
| 2005 | An auctioning reputation system based on anomaly. Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd |
| 2005 | Applications of secure electronic voting to automated privacy-preserving troubleshooting. Qiang Huang, David Jao, Helen J. Wang |
| 2005 | Automated trust negotiation using cryptographic credentials. Jiangtao Li, Ninghui Li, William H. Winsborough |
| 2005 | Automatic diagnosis and response to memory corruption vulnerabilities. Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt |
| 2005 | Automatic placement of authorization hooks in the linux security modules framework. Vinod Ganapathy, Trent Jaeger, Somesh Jha |
| 2005 | Biometrics hit the mainstream: an analysis of security and privacy implications. Vance Bjorn |
| 2005 | CPOL: high-performance policy evaluation. Kevin Borders, Xin Zhao, Atul Prakash |
| 2005 | Control-flow integrity. Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti |
| 2005 | Countering DoS attacks with stateless multipath overlays. Angelos Stavrou, Angelos D. Keromytis |
| 2005 | Deciding security of protocols against off-line guessing attacks. Mathieu Baudet |
| 2005 | Direct chosen ciphertext security from identity-based techniques. Xavier Boyen, Qixiang Mei, Brent Waters |
| 2005 | Dynamic and efficient key management for access hierarchies. Mikhail J. Atallah, Keith B. Frikken, Marina Blanton |
| 2005 | Exploiting open functionality in SMS-capable cellular networks. William Enck, Patrick Traynor, Patrick D. McDaniel, Thomas F. La Porta |
| 2005 | Fast and automated generation of attack signatures: a basis for building self-protecting servers. Zhenkai Liang, R. Sekar |
| 2005 | Fast dictionary attacks on passwords using time-space tradeoff. Arvind Narayanan, Vitaly Shmatikov |
| 2005 | Homeland security: cyber security R&D initiatives. W. Douglas Maughan |
| 2005 | Identity-based encryption from algorithm to enterprise deployment. Guido Appenzeller |
| 2005 | Improving Brumley and Boneh timing attack on unprotected SSL implementations. Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç |
| 2005 | Keyboard acoustic emanations revisited. Li Zhuang, Feng Zhou, J. D. Tygar |
| 2005 | Misbehaving TCP receivers can cause internet-wide congestion collapse. Rob Sherwood, Bobby Bhattacharjee, Ryan Braud |
| 2005 | Modeling insider attacks on group key-exchange protocols. Jonathan Katz, Ji Sun Shin |
| 2005 | New approaches for deniable authentication. Mario Di Raimondo, Rosario Gennaro |
| 2005 | Obfuscated databases and group privacy. Arvind Narayanan, Vitaly Shmatikov |
| 2005 | On authenticated computing and RSA-based authentication. Jean-Pierre Seifert |
| 2005 | On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong |
| 2005 | On the cost-ineffectiveness of redundancy in commercial P2P computing. Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg |
| 2005 | Password authenticated key exchange using hidden smooth subgroups. Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan |
| 2005 | PeerAccess: a logic for distributed authorization. Marianne Winslett, Charles C. Zhang, Piero A. Bonatti |
| 2005 | Preventing attribute information leakage in automated trust negotiation. Keith Irwin, Ting Yu |
| 2005 | Preventing format-string attacks via automatic and efficient dynamic checking. Michael F. Ringenburg, Dan Grossman |
| 2005 | Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005 Vijay Atluri, Catherine Meadows, Ari Juels |
| 2005 | Proxy re-signatures: new definitions, algorithms, and applications. Giuseppe Ateniese, Susan Hohenberger |
| 2005 | Secrecy types for a simulatable cryptographic library. Peeter Laud |
| 2005 | Secure collaboration in mediator-free environments. Mohamed Shehab, Elisa Bertino, Arif Ghafoor |
| 2005 | Securing publish-subscribe overlay services with EventGuard. Mudhakar Srivatsa, Ling Liu |
| 2005 | Security market: incentives for disclosure of vulnerabilities. Peter P. Swire |
| 2005 | Tracking anonymous peer-to-peer VoIP calls on the internet. Xinyuan Wang, Shiping Chen, Sushil Jajodia |
| 2005 | Understanding and developing role-based administrative models. Jason Crampton |
| 2005 | Untraceable RFID tags via insubvertible encryption. Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros |